Action not permitted
Modal body text goes here.
CVE-2012-0505
Vulnerability from cvelistv5
Published
2012-02-15 22:00
Modified
2024-08-06 18:23
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:31.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "48074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48074" }, { "name": "HPSBUX02784", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133847939902305\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "name": "SUSE-SU-2012:1013", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00015.html" }, { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "48692", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48692" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "SUSE-SU-2012:0881", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00007.html" }, { "name": "48589", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48589" }, { "name": "SSRT100805", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "SUSE-SU-2012:0734", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00009.html" }, { "name": "SUSE-SU-2012:0602", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "name": "RHSA-2013:1455", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "SUSE-SU-2012:0603", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" }, { "name": "48073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48073" }, { "name": "48950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48950" }, { "name": "48948", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48948" }, { "name": "SSRT100871", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133847939902305\u0026w=2" }, { "name": "48915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48915" }, { "name": "52017", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52017" }, { "name": "HPSBUX02757", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133364885411663\u0026w=2" }, { "name": "DSA-2420", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2420" }, { "name": "oval:org.mitre.oval:def:13976", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13976" }, { "name": "RHSA-2012:0508", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "name": "SSRT100867", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49198" }, { "name": "RHSA-2012:0514", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0514.html" }, { "name": "RHSA-2012:1080", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1080.html" }, { "name": "HPSBUX02777", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "RHSA-2012:0702", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0702.html" }, { "name": "HPSBUX02760", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "SSRT100854", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "SSRT100779", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133364885411663\u0026w=2" }, { "name": "HPSBMU02797", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-05T18:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "48074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48074" }, { "name": "HPSBUX02784", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133847939902305\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "name": "SUSE-SU-2012:1013", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00015.html" }, { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "48692", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48692" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "SUSE-SU-2012:0881", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00007.html" }, { "name": "48589", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48589" }, { "name": "SSRT100805", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "SUSE-SU-2012:0734", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00009.html" }, { "name": "SUSE-SU-2012:0602", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "name": "RHSA-2013:1455", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "SUSE-SU-2012:0603", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" }, { "name": "48073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48073" }, { "name": "48950", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48950" }, { "name": "48948", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48948" }, { "name": "SSRT100871", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133847939902305\u0026w=2" }, { "name": "48915", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48915" }, { "name": "52017", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52017" }, { "name": "HPSBUX02757", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133364885411663\u0026w=2" }, { "name": "DSA-2420", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2420" }, { "name": "oval:org.mitre.oval:def:13976", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13976" }, { "name": "RHSA-2012:0508", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "name": "SSRT100867", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49198" }, { "name": "RHSA-2012:0514", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0514.html" }, { "name": "RHSA-2012:1080", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1080.html" }, { "name": "HPSBUX02777", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "RHSA-2012:0702", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0702.html" }, { "name": "HPSBUX02760", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "SSRT100854", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "SSRT100779", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133364885411663\u0026w=2" }, { "name": "HPSBMU02797", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0505", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "48074", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48074" }, { "name": "HPSBUX02784", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133847939902305\u0026w=2" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "name": "SUSE-SU-2012:1013", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00015.html" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "48692", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48692" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "SUSE-SU-2012:0881", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00007.html" }, { "name": "48589", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48589" }, { "name": "SSRT100805", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "SUSE-SU-2012:0734", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00009.html" }, { "name": "SUSE-SU-2012:0602", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "name": "RHSA-2013:1455", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "SUSE-SU-2012:0603", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" }, { "name": "48073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48073" }, { "name": "48950", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48950" }, { "name": "48948", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48948" }, { "name": "SSRT100871", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133847939902305\u0026w=2" }, { "name": "48915", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48915" }, { "name": "52017", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52017" }, { "name": "HPSBUX02757", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133364885411663\u0026w=2" }, { "name": "DSA-2420", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2420" }, { "name": "oval:org.mitre.oval:def:13976", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13976" }, { "name": "RHSA-2012:0508", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "name": "SSRT100867", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49198" }, { "name": "RHSA-2012:0514", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0514.html" }, { "name": "RHSA-2012:1080", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1080.html" }, { "name": "HPSBUX02777", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "RHSA-2012:0702", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0702.html" }, { "name": "HPSBUX02760", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "SSRT100854", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "SSRT100779", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133364885411663\u0026w=2" }, { "name": "HPSBMU02797", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0505", "datePublished": "2012-02-15T22:00:00", "dateReserved": "2012-01-11T00:00:00", "dateUpdated": "2024-08-06T18:23:31.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-0505\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2012-02-15T22:55:01.393\",\"lastModified\":\"2022-05-13T14:52:58.333\",\"vulnStatus\":\"Modified\",\"evaluatorImpact\":\"Per: http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html\\r\\n\\r\\n\u0027Applies to client deployments of Java. This vulnerability can be exploited only through Untrusted Java Web Start applications and Untrusted Java applets. (Untrusted Java Web Start applications and untrusted applets run in the Java sandbox with limited privileges.)\u0027\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en el componente Java Runtime Environment (JRE) en Oracle Java SE v7 Update 2 y anteriores v6 Update 30 y anteriores v5.0 Update 33 y anteriores y v1.3.2_35 y anteriores, permite a aplicaciones remotas Java Web Start no confiables y applets Java no confiables, afectar a la confidencialidad, integridad y disponibilidad a trav\u00e9s de vectores relacionados con Serialization.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":7.5},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.4.2_35\",\"matchCriteriaId\":\"876A359C-85A8-4465-A7AD-058FF6C32028\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63978872-E797-4F13-B0F9-98CB67D0962A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EEAB662-644A-4D7B-8237-64142CF48724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9598A49-95F2-42DB-B92C-CD026F739B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED1009E-AE60-43A0-A0F5-38526EFCF423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D011585C-0E62-4233-85FA-F29A07D68DA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F226D898-F0E8-41D8-BF40-54DE9FB5426D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE28C283-447A-4F83-B96B-69F96E663C1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D102063B-2434-4141-98E7-2DE501AE1728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B8CD03-CD31-4F4D-BA90-59435578A4F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41A994BF-1F64-480A-8AA5-748DDD0AB68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88519F2D-AD06-4F05-BEDA-A09216F1B481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC728978-368D-4B36-B149-70473E92BD1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD5187B1-CB86-48E8-A595-9FCFD9822C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C660DE4-543A-4E9B-825D-CD099D08CBD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"318719C9-7B01-4021-B2EF-8341254DFE6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC5E64B6-77DA-44BC-B646-AE01041B1830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA35E80-9E0E-4A26-B631-A61542BE4739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED9E7C8-0418-4733-A496-61CCFD638859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6566CE32-E042-424A-893B-C8A9E26E2869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B760192E-7193-4FEF-8FFA-680AC89D45A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C020210-8EBA-41D2-BE4A-962CD902857C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"076444F1-543E-4061-9D39-415A1A889F5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B29C4AA1-30F8-4AA3-A8B5-4125CF9B66F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45BD257F-4310-44C7-A304-2F174FA93C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7B39AB-4B2E-40A2-9FB9-0E209DC7F24F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF9D788-1A3A-4988-8C7B-AFF0E81C68CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B3174A-58BB-469D-BB32-D503DBE58832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F82BE05-5170-4F9B-ADE8-935F5BC1BABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD793765-DA0B-422C-BD31-DA48A8F6EC7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C9033BD-6CEC-411E-90FF-02A860C6C7F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD29DE48-5913-4439-BAAD-3C5A6D2B639B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:*:update33:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.0\",\"matchCriteriaId\":\"B258E377-DD42-419B-A9F5-2D009E2FA76A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133A7B66-E0B3-4867-A5A4-3C54D6C0C8ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7FC09E8-7F30-4FE4-912E-588AA250E2A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"9919D091-73D7-465A-80FF-F37D6CAF9F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*\",\"matchCriteriaId\":\"02565D6F-4CB2-4671-A4EF-3169BCFA6154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*\",\"matchCriteriaId\":\"452A3E51-9EAC-451D-BA04-A1E7B7D917EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8C6AAC-C90B-4220-A69B-2A886A35CF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*\",\"matchCriteriaId\":\"55231B6B-9298-4363-9B5A-14C2DA7B1F50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42CF0F7-418C-4BB6-9B73-FA3B9171D092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5467E9D-07D8-4BEB-84D5-A3136C133519\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*\",\"matchCriteriaId\":\"B83B2CE1-45D7-47AD-BC0A-6EC74D5F8F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A32F326-EA92-43CD-930E-E527B60CDD3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EA5B9E9-654D-44F7-AE98-3D8B382804AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*\",\"matchCriteriaId\":\"04344167-530E-4A4D-90EF-74C684943DF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E0373B-201D-408F-9234-A7EFE8B4970D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"15EAD76D-D5D0-4984-9D07-C1451D791083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE949EBF-2BC0-4355-8B28-B494023D45FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0A0A2D-62B9-4A00-84EF-90C15E47A632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"A070A282-CBD6-4041-B149-5E310BD12E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECAE71B-C549-4EFB-A509-BFD599F5917A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*\",\"matchCriteriaId\":\"044BADDD-A80B-4AE2-8595-5F8186314550\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7FC11BE-8CF7-4D45-BB4A-3EFA1DDBB10D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D75C40D-62AE-47F2-A6E0-53F3495260BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"44051CFE-D15D-4416-A123-F3E49C67A9E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C061911-FB19-45EB-8E88-7450224F4023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F296ACF3-1373-429D-B991-8B5BA704A7EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B863420B-DE16-416A-9640-1A1340A9B855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"724C972F-74FE-4044-BBC4-7E0E61FC9002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE909DE-E55A-4BD3-A5BF-ADE407432193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DAC04D2-68FD-4793-A8E7-4690A543D7D4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:*:update30:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.6.0\",\"matchCriteriaId\":\"0581CE53-6C50-47F8-ACFD-4FD8C242D56F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF13B96D-1F80-4672-8DA3-F86F6D3BF070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1A2D440-D966-41A6-955D-38B28DDE0FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C57774-AD93-4162-8E45-92B09139C808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7C4194-D34A-418F-9B00-5C6012844AAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B82FB1-0F0E-44F9-87AE-628517279E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A67640-2F4A-488A-9D8F-3FE1F4DA8DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBCD143C-057D-4F42-B487-46801E14ACF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"09027C19-D442-446F-B7A8-21DB6787CF43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0FEC28-0707-4F42-9740-78F3D2D551EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3C5879A-A608-4230-9DC1-C27F0F48A13B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A3B254-8580-45DB-BDE4-5B5A29CBFFB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"AADBB4F9-E43E-428B-9979-F47A15696C85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"49260B94-05DE-4B78-9068-6F5F6BFDD19E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4FDE9EB-08FE-436E-A265-30E83B15DB23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7158D2C0-E9AC-4CD6-B777-EA7B7A181997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08C075B-9FC0-4381-A9E4-FFF0362BD308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*\",\"matchCriteriaId\":\"F587E635-3A15-4186-B6A1-F99BE0A56820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"90EC6C13-4B37-48E5-8199-A702A944D5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2528152C-E20A-4D97-931C-A5EC3CEAA06D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A99DAB4C-272B-4C91-BC70-7729E1152590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"30DFC10A-A4D9-4F89-B17C-AB9260087D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"272A5C44-18EC-41A9-8233-E9D4D0734EA6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:*:update2:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.7.0\",\"matchCriteriaId\":\"73C38D79-C2B5-45D7-857C-64CBB7888D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C27372B-A091-46D5-AE39-A44BBB1D9EE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4B153FD-E20B-4909-8B10-884E48F5B590\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00009.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00007.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00015.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133364885411663\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133847939902305\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0508.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0514.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0702.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1080.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1455.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/48073\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/48074\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/48589\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/48692\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/48915\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/48948\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/48950\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/49198\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2420\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/52017\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13976\",\"source\":\"secalert_us@oracle.com\"}]}}" } }
rhsa-2012_0702
Vulnerability from csaf_redhat
Published
2012-05-30 16:09
Modified
2024-11-14 11:31
Summary
Red Hat Security Advisory: java-1.4.2-ibm security update
Notes
Topic
Updated java-1.4.2-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 5 Supplementary.
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The IBM Java SE version 1.4.2 release includes the IBM Java 1.4.2 Runtime
Environment and the IBM Java 1.4.2 Software Development Kit.
This update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime
Environment and the IBM Java 1.4.2 Software Development Kit. Detailed
vulnerability descriptions are linked from the IBM "Security alerts" page,
listed in the References section. (CVE-2011-3563, CVE-2012-0499,
CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506)
All users of java-1.4.2-ibm are advised to upgrade to these updated
packages, which contain the IBM Java 1.4.2 SR13-FP12 release. All running
instances of IBM Java must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The IBM Java SE version 1.4.2 release includes the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3563, CVE-2012-0499,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506)\n\nAll users of java-1.4.2-ibm are advised to upgrade to these updated\npackages, which contain the IBM Java 1.4.2 SR13-FP12 release. All running\ninstances of IBM Java must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0702", "url": "https://access.redhat.com/errata/RHSA-2012:0702" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0702.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-ibm security update", "tracking": { "current_release_date": "2024-11-14T11:31:17+00:00", "generator": { "date": "2024-11-14T11:31:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0702", "initial_release_date": "2012-05-30T16:09:00+00:00", "revision_history": [ { "date": "2012-05-30T16:09:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-05-30T16:09:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:31:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.12-1jpp.1.el5_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.12-1jpp.1.el5_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.12-1jpp.1.el5_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.12-1jpp.1.el5_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.12-1jpp.1.el5_8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.12-1jpp.1.el5_8?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.12-1jpp.1.el5_8?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.12-1jpp.1.el5_8?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.12-1jpp.1.el5_8?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.12-1jpp.1.el5_8?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.12-1jpp.1.el5_8?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.12-1jpp.1.el5_8?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.12-1jpp.1.el5_8?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.12-1jpp.1.el5_8?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.12-1jpp.1.el5_8?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.12-1jpp.1.el5_8?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.12-1jpp.1.el5_8?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.12-1jpp.1.el5_8?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.12-1jpp.1.el5_8?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.12-1jpp.1.el5_8?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.12-1jpp.1.el5_8?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.12-1jpp.1.el5_8?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.12-1jpp.1.el5_8?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.12-1jpp.1.el5_8?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.12-1jpp.1.el5_8?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.12-1jpp.1.el5_8?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.12-1jpp.1.el5_8?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.12-1jpp.1.el5_8?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.12-1jpp.1.el5_8?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.12-1jpp.1.el5_8?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.12-1jpp.1.el5_8?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.12-1jpp.1.el5_8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.12-1jpp.1.el5_8?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.12-1jpp.1.el5_8?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.12-1jpp.1.el5_8?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.12-1jpp.1.el5_8?arch=ia64" } } } ], "category": "architecture", "name": "ia64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3563", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3563" }, { "category": "external", "summary": "RHBZ#789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-30T16:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0702" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)" }, { "cve": "CVE-2012-0499", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790722" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0499" }, { "category": "external", "summary": "RHBZ#790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-30T16:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0702" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0502", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789297" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0502" }, { "category": "external", "summary": "RHBZ#789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-30T16:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0702" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)" }, { "cve": "CVE-2012-0503", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788976" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0503" }, { "category": "external", "summary": "RHBZ#788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-30T16:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0702" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)" }, { "cve": "CVE-2012-0505", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0505" }, { "category": "external", "summary": "RHBZ#789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-30T16:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0702" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)" }, { "cve": "CVE-2012-0506", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0506" }, { "category": "external", "summary": "RHBZ#789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-30T16:09:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0702" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Client-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-demo-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-devel-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-javacomm-0:1.4.2.13.12-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-jdbc-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-plugin-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.i386", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ia64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.ppc64", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.s390x", "5Server-Supplementary-5.8.Z:java-1.4.2-ibm-src-0:1.4.2.13.12-1jpp.1.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)" } ] }
rhsa-2012_0139
Vulnerability from csaf_redhat
Published
2012-02-16 18:52
Modified
2024-11-14 11:30
Summary
Red Hat Security Advisory: java-1.6.0-sun security update
Notes
Topic
Updated java-1.6.0-sun packages that fix several security issues are now
available for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise
Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and
the Sun Java 6 Software Development Kit.
This update fixes several vulnerabilities in the Sun Java 6 Runtime
Environment and the Sun Java 6 Software Development Kit. Further
information about these flaws can be found on the Oracle Java SE Critical
Patch page, listed in the References section. (CVE-2011-3563,
CVE-2011-3571, CVE-2011-5035, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500,
CVE-2012-0501, CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506)
All users of java-1.6.0-sun are advised to upgrade to these updated
packages, which provide JDK and JRE 6 Update 31 and resolve these issues.
All running instances of Sun Java must be restarted for the update to take
effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-sun packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch page, listed in the References section. (CVE-2011-3563,\nCVE-2011-3571, CVE-2011-5035, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500,\nCVE-2012-0501, CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506)\n\nAll users of java-1.6.0-sun are advised to upgrade to these updated\npackages, which provide JDK and JRE 6 Update 31 and resolve these issues.\nAll running instances of Sun Java must be restarted for the update to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0139", "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/java/javase/6u31-relnotes-1482342.html", "url": "http://www.oracle.com/technetwork/java/javase/6u31-relnotes-1482342.html" }, { "category": "external", "summary": "788606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788606" }, { "category": "external", "summary": "788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "790724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0139.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-sun security update", "tracking": { "current_release_date": "2024-11-14T11:30:28+00:00", "generator": { "date": "2024-11-14T11:30:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0139", "initial_release_date": "2012-02-16T18:52:00+00:00", "revision_history": [ { "date": "2012-02-16T18:52:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-02-16T19:00:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:30:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.31-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.31-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.31-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.31-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.31-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.31-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.31-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.31-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.31-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.31-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.31-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.31-1jpp.1.el5?arch=i586\u0026epoch=1" } } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.31-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.31-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.31-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.31-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.31-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.31-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.31-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.31-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.31-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.31-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.31-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.31-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.31-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.31-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.31-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.31-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.31-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.31-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.31-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.31-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.31-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.31-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.31-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.31-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3563", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3563" }, { "category": "external", "summary": "RHBZ#789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)" }, { "cve": "CVE-2011-3571", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Virtual Desktop Infrastructure (VDI) component in Oracle Virtualization 3.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Session. NOTE: this CVE identifier was accidentally used for a Concurrency issue in Java Runtime Environment, but that issue has been reassigned to CVE-2012-0507.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3571" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3571", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3571" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" }, { "cve": "CVE-2011-5035", "discovery_date": "2011-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771283" } ], "notes": [ { "category": "description", "text": "Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.", "title": "Vulnerability description" }, { "category": "summary", "text": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. This issue affects the GlassFish Web Container component. This\ncomponent is not shipped with any Red Hat products. JBoss Web and Tomcat\nprovide the web container used in all JBoss products.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5035" }, { "category": "external", "summary": "RHBZ#771283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5035", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5035" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035" } ], "release_date": "2011-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)" }, { "cve": "CVE-2012-0498", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790720" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0498" }, { "category": "external", "summary": "RHBZ#790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0499", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790722" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0499" }, { "category": "external", "summary": "RHBZ#790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0500", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790724" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0500" }, { "category": "external", "summary": "RHBZ#790724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0500", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)" }, { "cve": "CVE-2012-0501", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788624" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0501" }, { "category": "external", "summary": "RHBZ#788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)" }, { "cve": "CVE-2012-0502", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789297" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0502" }, { "category": "external", "summary": "RHBZ#789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)" }, { "cve": "CVE-2012-0503", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788976" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0503" }, { "category": "external", "summary": "RHBZ#788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)" }, { "cve": "CVE-2012-0505", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0505" }, { "category": "external", "summary": "RHBZ#789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)" }, { "cve": "CVE-2012-0506", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0506" }, { "category": "external", "summary": "RHBZ#789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)" }, { "cve": "CVE-2012-0507", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0507" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0507" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-16T18:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0139" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el4.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Client-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el5.x86_64", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.i586", "5Server-Supplementary-5.7.Z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.31-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.31-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" } ] }
rhsa-2012_0514
Vulnerability from csaf_redhat
Published
2012-04-24 19:32
Modified
2024-11-14 11:31
Summary
Red Hat Security Advisory: java-1.6.0-ibm security update
Notes
Topic
Updated java-1.6.0-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The IBM Java SE version 6 release includes the IBM Java 6 Runtime
Environment and the IBM Java 6 Software Development Kit.
This update fixes several vulnerabilities in the IBM Java 6 Runtime
Environment and the IBM Java 6 Software Development Kit. Detailed
vulnerability descriptions are linked from the IBM "Security alerts" page,
listed in the References section. (CVE-2011-3563, CVE-2011-5035,
CVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501,
CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507)
All users of java-1.6.0-ibm are advised to upgrade to these updated
packages, containing the IBM Java 6 SR10-FP1 release. All running instances
of IBM Java must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The IBM Java SE version 6 release includes the IBM Java 6 Runtime\nEnvironment and the IBM Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 6 Runtime\nEnvironment and the IBM Java 6 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3563, CVE-2011-5035,\nCVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM Java 6 SR10-FP1 release. All running instances\nof IBM Java must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0514", "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "788606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788606" }, { "category": "external", "summary": "788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "external", "summary": "790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "790724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0514.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-ibm security update", "tracking": { "current_release_date": "2024-11-14T11:31:06+00:00", "generator": { "date": "2024-11-14T11:31:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0514", "initial_release_date": "2012-04-24T19:32:00+00:00", "revision_history": [ { "date": "2012-04-24T19:32:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-11-13T11:13:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:31:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.1-1jpp.5.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.1-1jpp.5.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.1-1jpp.5.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.5.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.1-1jpp.5.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.1-1jpp.5.el6_2?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_id": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.5.el6_2?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "product_id": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.5.el6_2?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.1-1jpp.5.el6_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.1-1jpp.5.el6_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.1-1jpp.5.el6_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.5.el6_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.1-1jpp.5.el6_2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.1-1jpp.5.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.1-1jpp.5.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.1-1jpp.5.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.1-1jpp.5.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.5.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.1-1jpp.5.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.1-1jpp.5.el6_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.10.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.10.1-1jpp.5.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.10.1-1jpp.5.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.10.1-1jpp.5.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_id": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.10.1-1jpp.5.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.10.1-1jpp.5.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_id": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.10.1-1jpp.5.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.10.1-1jpp.5.el6_2?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3563", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3563" }, { "category": "external", "summary": "RHBZ#789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)" }, { "cve": "CVE-2011-5035", "discovery_date": "2011-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771283" } ], "notes": [ { "category": "description", "text": "Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.", "title": "Vulnerability description" }, { "category": "summary", "text": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. This issue affects the GlassFish Web Container component. This\ncomponent is not shipped with any Red Hat products. JBoss Web and Tomcat\nprovide the web container used in all JBoss products.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5035" }, { "category": "external", "summary": "RHBZ#771283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5035", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5035" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035" } ], "release_date": "2011-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)" }, { "cve": "CVE-2012-0497", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789301" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0497" }, { "category": "external", "summary": "RHBZ#789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0497", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0497" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)" }, { "cve": "CVE-2012-0498", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790720" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0498" }, { "category": "external", "summary": "RHBZ#790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0499", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790722" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0499" }, { "category": "external", "summary": "RHBZ#790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0500", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790724" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0500" }, { "category": "external", "summary": "RHBZ#790724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0500", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)" }, { "cve": "CVE-2012-0501", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788624" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0501" }, { "category": "external", "summary": "RHBZ#788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)" }, { "cve": "CVE-2012-0502", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789297" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0502" }, { "category": "external", "summary": "RHBZ#789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)" }, { "cve": "CVE-2012-0503", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788976" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0503" }, { "category": "external", "summary": "RHBZ#788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)" }, { "cve": "CVE-2012-0505", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0505" }, { "category": "external", "summary": "RHBZ#789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)" }, { "cve": "CVE-2012-0506", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0506" }, { "category": "external", "summary": "RHBZ#789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)" }, { "cve": "CVE-2012-0507", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0507" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0507" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-24T19:32:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-accessibility-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-demo-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-devel-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-javacomm-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-jdbc-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-plugin-1:1.6.0.10.1-1jpp.5.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.6.0-ibm-src-1:1.6.0.10.1-1jpp.5.el6_2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" } ] }
rhsa-2013_1455
Vulnerability from csaf_redhat
Published
2013-10-23 16:26
Modified
2024-11-22 06:37
Summary
Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update
Notes
Topic
Updated java-1.6.0-ibm packages that fix several security issues are now
available for Red Hat Network Satellite Server 5.4.
The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
This update corrects several security vulnerabilities in the IBM Java
Runtime Environment shipped as part of Red Hat Network Satellite Server
5.4. In a typical operating environment, these are of low security risk as
the runtime is not used on untrusted applets.
Several flaws were fixed in the IBM Java 2 Runtime Environment.
(CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0865,
CVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873,
CVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545,
CVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550,
CVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556,
CVE-2011-3557, CVE-2011-3560, CVE-2011-3561, CVE-2011-3563, CVE-2011-5035,
CVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501,
CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507,
CVE-2012-0547, CVE-2012-0551, CVE-2012-1531, CVE-2012-1532, CVE-2012-1533,
CVE-2012-1541, CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717,
CVE-2012-1718, CVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1725,
CVE-2012-3143, CVE-2012-3159, CVE-2012-3213, CVE-2012-3216, CVE-2012-3342,
CVE-2012-4820, CVE-2012-4822, CVE-2012-4823, CVE-2012-5068, CVE-2012-5069,
CVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5079,
CVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5089, CVE-2013-0169,
CVE-2013-0351, CVE-2013-0401, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,
CVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428,
CVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438,
CVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445,
CVE-2013-0446, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476,
CVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486, CVE-2013-1487,
CVE-2013-1491, CVE-2013-1493, CVE-2013-1500, CVE-2013-1537, CVE-2013-1540,
CVE-2013-1557, CVE-2013-1563, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383,
CVE-2013-2384, CVE-2013-2394, CVE-2013-2407, CVE-2013-2412, CVE-2013-2417,
CVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424,
CVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435,
CVE-2013-2437, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444,
CVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451,
CVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456,
CVE-2013-2457, CVE-2013-2459, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465,
CVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471,
CVE-2013-2472, CVE-2013-2473, CVE-2013-3743)
Users of Red Hat Network Satellite Server 5.4 are advised to upgrade to
these updated packages, which contain the IBM Java SE 6 SR14 release. For
this update to take effect, Red Hat Network Satellite Server must be
restarted ("/usr/sbin/rhn-satellite restart"), as well as all running
instances of IBM Java.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.4.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.4. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2011-0802, CVE-2011-0814, CVE-2011-0862, CVE-2011-0863, CVE-2011-0865,\nCVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871, CVE-2011-0873,\nCVE-2011-3389, CVE-2011-3516, CVE-2011-3521, CVE-2011-3544, CVE-2011-3545,\nCVE-2011-3546, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3550,\nCVE-2011-3551, CVE-2011-3552, CVE-2011-3553, CVE-2011-3554, CVE-2011-3556,\nCVE-2011-3557, CVE-2011-3560, CVE-2011-3561, CVE-2011-3563, CVE-2011-5035,\nCVE-2012-0497, CVE-2012-0498, CVE-2012-0499, CVE-2012-0500, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507,\nCVE-2012-0547, CVE-2012-0551, CVE-2012-1531, CVE-2012-1532, CVE-2012-1533,\nCVE-2012-1541, CVE-2012-1682, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717,\nCVE-2012-1718, CVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1725,\nCVE-2012-3143, CVE-2012-3159, CVE-2012-3213, CVE-2012-3216, CVE-2012-3342,\nCVE-2012-4820, CVE-2012-4822, CVE-2012-4823, CVE-2012-5068, CVE-2012-5069,\nCVE-2012-5071, CVE-2012-5072, CVE-2012-5073, CVE-2012-5075, CVE-2012-5079,\nCVE-2012-5081, CVE-2012-5083, CVE-2012-5084, CVE-2012-5089, CVE-2013-0169,\nCVE-2013-0351, CVE-2013-0401, CVE-2013-0409, CVE-2013-0419, CVE-2013-0423,\nCVE-2013-0424, CVE-2013-0425, CVE-2013-0426, CVE-2013-0427, CVE-2013-0428,\nCVE-2013-0432, CVE-2013-0433, CVE-2013-0434, CVE-2013-0435, CVE-2013-0438,\nCVE-2013-0440, CVE-2013-0441, CVE-2013-0442, CVE-2013-0443, CVE-2013-0445,\nCVE-2013-0446, CVE-2013-0450, CVE-2013-0809, CVE-2013-1473, CVE-2013-1476,\nCVE-2013-1478, CVE-2013-1480, CVE-2013-1481, CVE-2013-1486, CVE-2013-1487,\nCVE-2013-1491, CVE-2013-1493, CVE-2013-1500, CVE-2013-1537, CVE-2013-1540,\nCVE-2013-1557, CVE-2013-1563, CVE-2013-1569, CVE-2013-1571, CVE-2013-2383,\nCVE-2013-2384, CVE-2013-2394, CVE-2013-2407, CVE-2013-2412, CVE-2013-2417,\nCVE-2013-2418, CVE-2013-2419, CVE-2013-2420, CVE-2013-2422, CVE-2013-2424,\nCVE-2013-2429, CVE-2013-2430, CVE-2013-2432, CVE-2013-2433, CVE-2013-2435,\nCVE-2013-2437, CVE-2013-2440, CVE-2013-2442, CVE-2013-2443, CVE-2013-2444,\nCVE-2013-2446, CVE-2013-2447, CVE-2013-2448, CVE-2013-2450, CVE-2013-2451,\nCVE-2013-2452, CVE-2013-2453, CVE-2013-2454, CVE-2013-2455, CVE-2013-2456,\nCVE-2013-2457, CVE-2013-2459, CVE-2013-2463, CVE-2013-2464, CVE-2013-2465,\nCVE-2013-2466, CVE-2013-2468, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471,\nCVE-2013-2472, CVE-2013-2473, CVE-2013-3743)\n\nUsers of Red Hat Network Satellite Server 5.4 are advised to upgrade to\nthese updated packages, which contain the IBM Java SE 6 SR14 release. For\nthis update to take effect, Red Hat Network Satellite Server must be\nrestarted (\"/usr/sbin/rhn-satellite restart\"), as well as all running\ninstances of IBM Java.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:1455", "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "706106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106" }, { "category": "external", "summary": "706139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139" }, { "category": "external", "summary": "706153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153" }, { "category": "external", "summary": "706234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234" }, { "category": "external", "summary": "706241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241" }, { "category": "external", "summary": "706248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248" }, { "category": "external", "summary": "711675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675" }, { "category": "external", "summary": "711676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676" }, { "category": "external", "summary": "711677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677" }, { "category": "external", "summary": "737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "747200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200" }, { "category": "external", "summary": "747203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203" }, { "category": "external", "summary": "747205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205" }, { "category": "external", "summary": "747208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208" }, { "category": "external", "summary": "788606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788606" }, { "category": "external", "summary": "788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "external", "summary": "790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "790724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724" }, { "category": "external", "summary": "829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "external", "summary": "853097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097" }, { "category": "external", "summary": "853228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228" }, { "category": "external", "summary": "859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "865346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346" }, { "category": "external", "summary": "865348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348" }, { "category": "external", "summary": "865357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357" }, { "category": "external", "summary": "865363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363" }, { "category": "external", "summary": "865365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365" }, { "category": "external", "summary": "865370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370" }, { "category": "external", "summary": "865511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511" }, { "category": "external", "summary": "865514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514" }, { "category": "external", "summary": "865519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519" }, { "category": "external", "summary": "865531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531" }, { "category": "external", "summary": "865568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568" }, { "category": "external", "summary": "867185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185" }, { "category": "external", "summary": "867186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186" }, { "category": "external", "summary": "867187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187" }, { "category": "external", "summary": "867189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189" }, { "category": "external", "summary": "867190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190" }, { "category": "external", "summary": "867193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193" }, { "category": "external", "summary": "876386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386" }, { "category": "external", "summary": "876388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388" }, { "category": "external", "summary": "876389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389" }, { "category": "external", "summary": "906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "907589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" }, { "category": "external", "summary": "913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "external", "summary": "920245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245" }, { "category": "external", "summary": "920248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248" }, { "category": "external", "summary": "952387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387" }, { "category": "external", "summary": "952509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509" }, { "category": "external", "summary": "952521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521" }, { "category": "external", "summary": "952524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524" }, { "category": "external", "summary": "952638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638" }, { "category": "external", "summary": "952642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642" }, { "category": "external", "summary": "952648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648" }, { "category": "external", "summary": "952656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656" }, { "category": "external", "summary": "952657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657" }, { "category": "external", "summary": "952708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708" }, { "category": "external", "summary": "952709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709" }, { "category": "external", "summary": "952711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711" }, { "category": "external", "summary": "953166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166" }, { "category": "external", "summary": "953172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172" }, { "category": "external", "summary": "953265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265" }, { "category": "external", "summary": "953267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267" }, { "category": "external", "summary": "953269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269" }, { "category": "external", "summary": "953270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270" }, { "category": "external", "summary": "953273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273" }, { "category": "external", "summary": "953275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275" }, { "category": "external", "summary": "973474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474" }, { "category": "external", "summary": "975099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099" }, { "category": "external", "summary": "975102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102" }, { "category": "external", "summary": "975107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107" }, { "category": "external", "summary": "975110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110" }, { "category": "external", "summary": "975115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115" }, { "category": "external", "summary": "975118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118" }, { "category": "external", "summary": "975120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120" }, { "category": "external", "summary": "975121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121" }, { "category": "external", "summary": "975125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125" }, { "category": "external", "summary": "975127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127" }, { "category": "external", "summary": "975129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129" }, { "category": "external", "summary": "975131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131" }, { "category": "external", "summary": "975132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132" }, { "category": "external", "summary": "975133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133" }, { "category": "external", "summary": "975134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134" }, { "category": "external", "summary": "975137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137" }, { "category": "external", "summary": "975138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138" }, { "category": "external", "summary": "975139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139" }, { "category": "external", "summary": "975140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140" }, { "category": "external", "summary": "975141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141" }, { "category": "external", "summary": "975142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142" }, { "category": "external", "summary": "975144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144" }, { "category": "external", "summary": "975146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146" }, { "category": "external", "summary": "975148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148" }, { "category": "external", "summary": "975757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757" }, { "category": "external", "summary": "975761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761" }, { "category": "external", "summary": "975764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764" }, { "category": "external", "summary": "975767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767" }, { "category": "external", "summary": "975770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770" }, { "category": "external", "summary": "975773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1455.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update", "tracking": { "current_release_date": "2024-11-22T06:37:03+00:00", "generator": { "date": "2024-11-22T06:37:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:1455", "initial_release_date": "2013-10-23T16:26:00+00:00", "revision_history": [ { "date": "2013-10-23T16:26:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-10-23T16:30:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T06:37:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el5" } } }, { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el5_9?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product_id": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.14.0-1jpp.1.el6_4?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "relates_to_product_reference": "6Server-Satellite" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.6)", "product_id": "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "relates_to_product_reference": "6Server-Satellite" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-0802", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711677" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0802" }, { "category": "external", "summary": "RHBZ#711677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0802", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0802" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)" }, { "cve": "CVE-2011-0814", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711677" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0802.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0814" }, { "category": "external", "summary": "RHBZ#711677", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711677" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0814", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0814" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerabilities fixed in 6u26 (Sound)" }, { "cve": "CVE-2011-0862", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706139" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0862" }, { "category": "external", "summary": "RHBZ#706139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0862", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0862" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0862" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519)" }, { "cve": "CVE-2011-0863", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711676" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0863" }, { "category": "external", "summary": "RHBZ#711676", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711676" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0863", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0863" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0863" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u26 (Deployment)" }, { "cve": "CVE-2011-0865", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706106" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0865" }, { "category": "external", "summary": "RHBZ#706106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706106" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0865", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0865" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0865" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658)" }, { "cve": "CVE-2011-0867", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706153" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: NetworkInterface information leak (Networking, 7013969)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0867" }, { "category": "external", "summary": "RHBZ#706153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0867", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0867" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: NetworkInterface information leak (Networking, 7013969)" }, { "cve": "CVE-2011-0868", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706241" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0868" }, { "category": "external", "summary": "RHBZ#706241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706241" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0868", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0868" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0868" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495)" }, { "cve": "CVE-2011-0869", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706234" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 26 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to SAAJ.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0869" }, { "category": "external", "summary": "RHBZ#706234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706234" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0869", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0869" } ], "release_date": "2011-06-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971)" }, { "cve": "CVE-2011-0871", "discovery_date": "2011-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "706248" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0871" }, { "category": "external", "summary": "RHBZ#706248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=706248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0871", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0871" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198)" }, { "cve": "CVE-2011-0873", "discovery_date": "2011-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "711675" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, and 5.0 Update 29 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u26 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0873" }, { "category": "external", "summary": "RHBZ#711675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=711675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0873", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0873" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0873" } ], "release_date": "2011-06-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u26 (2D)" }, { "cve": "CVE-2011-3389", "discovery_date": "2011-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "737506" } ], "notes": [ { "category": "description", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3389" }, { "category": "external", "summary": "RHBZ#737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389" } ], "release_date": "2011-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)" }, { "cve": "CVE-2011-3516", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747203" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3516" }, { "category": "external", "summary": "RHBZ#747203", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747203" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3516", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3516" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3521", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745442" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3521" }, { "category": "external", "summary": "RHBZ#745442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745442" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3521", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3521" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3521" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: IIOP deserialization code execution (Deserialization, 7055902)" }, { "cve": "CVE-2011-3544", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745399" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3544" }, { "category": "external", "summary": "RHBZ#745399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3544", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3544" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3544" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823)" }, { "cve": "CVE-2011-3545", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747191" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3545" }, { "category": "external", "summary": "RHBZ#747191", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747191" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3545", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3545" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3545" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Sound)" }, { "cve": "CVE-2011-3546", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747205" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3546" }, { "category": "external", "summary": "RHBZ#747205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747205" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3546", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3546" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3546" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3547", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3547" }, { "category": "external", "summary": "RHBZ#745387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3547", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3547" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InputStream skip() information leak (Networking/IO, 7000600)" }, { "cve": "CVE-2011-3548", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745473" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3548" }, { "category": "external", "summary": "RHBZ#745473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745473" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3548", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3548" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: mutable static AWTKeyStroke.ctor (AWT, 7019773)" }, { "cve": "CVE-2011-3549", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747198" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Swing)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3549" }, { "category": "external", "summary": "RHBZ#747198", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747198" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3549", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3549" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Swing)" }, { "cve": "CVE-2011-3550", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747200" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (AWT)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3550" }, { "category": "external", "summary": "RHBZ#747200", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747200" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3550", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3550" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (AWT)" }, { "cve": "CVE-2011-3551", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745391" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3551" }, { "category": "external", "summary": "RHBZ#745391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3551", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3551" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Java2D TransformHelper integer overflow (2D, 7023640)" }, { "cve": "CVE-2011-3552", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745397" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3552" }, { "category": "external", "summary": "RHBZ#745397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3552", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3552" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3552" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: excessive default UDP socket limit under SecurityManager (Networking, 7032417)" }, { "cve": "CVE-2011-3553", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745476" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3553" }, { "category": "external", "summary": "RHBZ#745476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745476" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3553", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3553" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3553" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JAX-WS stack-traces information leak (JAX-WS, 7046794)" }, { "cve": "CVE-2011-3554", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745447" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3554" }, { "category": "external", "summary": "RHBZ#745447", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745447" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3554", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3554" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient pack200 JAR files uncompress error checks (Runtime, 7057857)" }, { "cve": "CVE-2011-3556", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745459" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3556" }, { "category": "external", "summary": "RHBZ#745459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745459" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3556", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3556" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RMI DGC server remote code execution (RMI, 7077466)" }, { "cve": "CVE-2011-3557", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745464" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3557" }, { "category": "external", "summary": "RHBZ#745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)" }, { "cve": "CVE-2011-3560", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745379" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3560" }, { "category": "external", "summary": "RHBZ#745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)" }, { "cve": "CVE-2011-3561", "discovery_date": "2011-10-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "747208" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3561" }, { "category": "external", "summary": "RHBZ#747208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=747208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3561", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3561" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3561" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK: unspecified vulnerability fixed in 6u29 (Deployment)" }, { "cve": "CVE-2011-3563", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3563" }, { "category": "external", "summary": "RHBZ#789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)" }, { "cve": "CVE-2011-5035", "discovery_date": "2011-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771283" } ], "notes": [ { "category": "description", "text": "Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.", "title": "Vulnerability description" }, { "category": "summary", "text": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. This issue affects the GlassFish Web Container component. This\ncomponent is not shipped with any Red Hat products. JBoss Web and Tomcat\nprovide the web container used in all JBoss products.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5035" }, { "category": "external", "summary": "RHBZ#771283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5035", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5035" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035" } ], "release_date": "2011-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)" }, { "cve": "CVE-2012-0497", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789301" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0497" }, { "category": "external", "summary": "RHBZ#789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0497", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0497" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)" }, { "cve": "CVE-2012-0498", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790720" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0498" }, { "category": "external", "summary": "RHBZ#790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0499", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790722" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0499" }, { "category": "external", "summary": "RHBZ#790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0500", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790724" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0500" }, { "category": "external", "summary": "RHBZ#790724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0500", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0500" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (Deployment)" }, { "cve": "CVE-2012-0501", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788624" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0501" }, { "category": "external", "summary": "RHBZ#788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)" }, { "cve": "CVE-2012-0502", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789297" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0502" }, { "category": "external", "summary": "RHBZ#789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)" }, { "cve": "CVE-2012-0503", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788976" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0503" }, { "category": "external", "summary": "RHBZ#788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)" }, { "cve": "CVE-2012-0505", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0505" }, { "category": "external", "summary": "RHBZ#789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)" }, { "cve": "CVE-2012-0506", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0506" }, { "category": "external", "summary": "RHBZ#789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)" }, { "cve": "CVE-2012-0507", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0507" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0507" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" }, { "cve": "CVE-2012-0547", "discovery_date": "2012-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "853228" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and \"a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited.\" NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"toolkit internals references.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AWT hardening fixes (AWT, 7163201)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0547" }, { "category": "external", "summary": "RHBZ#853228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853228" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0547", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0547" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0547" } ], "release_date": "2012-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: AWT hardening fixes (AWT, 7163201)" }, { "cve": "CVE-2012-0551", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831355" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0551" }, { "category": "external", "summary": "RHBZ#831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0551", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1531", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867185" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1531" }, { "category": "external", "summary": "RHBZ#867185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1531", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1531" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1531" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (2D)" }, { "cve": "CVE-2012-1532", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867186" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier and 6 Update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1532" }, { "category": "external", "summary": "RHBZ#867186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867186" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1532", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1532" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1532" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-1533", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867187" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-3159.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1533" }, { "category": "external", "summary": "RHBZ#867187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1533", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1533" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1533" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-1541", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906914" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1541" }, { "category": "external", "summary": "RHBZ#906914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1541", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1541" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-1682", "discovery_date": "2012-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "853097" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136. NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to \"XMLDecoder security issue via ClassFinder.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1682" }, { "category": "external", "summary": "RHBZ#853097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853097" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1682", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1682" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html" } ], "release_date": "2012-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: beans ClassFinder insufficient permission checks (beans, 7162476)" }, { "cve": "CVE-2012-1713", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829361" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1713" }, { "category": "external", "summary": "RHBZ#829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)" }, { "cve": "CVE-2012-1716", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829360" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1716" }, { "category": "external", "summary": "RHBZ#829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)" }, { "cve": "CVE-2012-1717", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829358" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1717" }, { "category": "external", "summary": "RHBZ#829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)" }, { "cve": "CVE-2012-1718", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829372" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1718" }, { "category": "external", "summary": "RHBZ#829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)" }, { "cve": "CVE-2012-1719", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829371" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1719" }, { "category": "external", "summary": "RHBZ#829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)" }, { "cve": "CVE-2012-1721", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831353" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1721" }, { "category": "external", "summary": "RHBZ#831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1721", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1722", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831354" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1721.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1722" }, { "category": "external", "summary": "RHBZ#831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1722", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1722" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1725", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829376" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1725" }, { "category": "external", "summary": "RHBZ#829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)" }, { "cve": "CVE-2012-3143", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867189" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-5089.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3143" }, { "category": "external", "summary": "RHBZ#867189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867189" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3143", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3143" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (JMX)" }, { "cve": "CVE-2012-3159", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867190" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3159" }, { "category": "external", "summary": "RHBZ#867190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3159", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3159" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3159" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability (Deployment)" }, { "cve": "CVE-2012-3213", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907223" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3213" }, { "category": "external", "summary": "RHBZ#907223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3213", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3213" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Scripting)" }, { "cve": "CVE-2012-3216", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3216" }, { "category": "external", "summary": "RHBZ#865346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3216", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3216" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)" }, { "cve": "CVE-2012-3342", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906917" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3342" }, { "category": "external", "summary": "RHBZ#906917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3342", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3342" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3342" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2012-4820", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876386" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, when running under a security manager, allows remote attackers to gain privileges by modifying or removing the security manager via vectors related to \"insecure use of the java.lang.reflect.Method invoke() method.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.reflect.Method invoke() code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4820" }, { "category": "external", "summary": "RHBZ#876386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4820", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4820" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78764", "url": "http://xforce.iss.net/xforce/xfdb/78764" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.reflect.Method invoke() code execution" }, { "cve": "CVE-2012-4822", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876388" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allow remote attackers to execute arbitrary code via vectors related to \"insecure use [of] multiple methods in the java.lang.class class.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.class code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4822" }, { "category": "external", "summary": "RHBZ#876388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4822", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4822" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4822" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78766", "url": "http://xforce.iss.net/xforce/xfdb/78766" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.class code execution" }, { "cve": "CVE-2012-4823", "discovery_date": "2012-11-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "876389" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the JRE component in IBM Java 7 SR2 and earlier, Java 6.0.1 SR3 and earlier, Java 6 SR11 and earlier, Java 5 SR14 and earlier, and Java 142 SR13 FP13 and earlier; as used in IBM Rational Host On-Demand, Rational Change, Tivoli Monitoring, Smart Analytics System 5600, Tivoli Remote Control 5.1.2, WebSphere Real Time, Lotus Notes \u0026 Domino, Tivoli Storage Productivity Center, and Service Deliver Manager; and other products from other vendors such as Red Hat, allows remote attackers to execute arbitrary code via vectors related to \"insecure use of the java.lang.ClassLoder defineClass() method.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: java.lang.ClassLoder defineClass() code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4823" }, { "category": "external", "summary": "RHBZ#876389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=876389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4823", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4823" }, { "category": "external", "summary": "http://xforce.iss.net/xforce/xfdb/78767", "url": "http://xforce.iss.net/xforce/xfdb/78767" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: java.lang.ClassLoder defineClass() code execution" }, { "cve": "CVE-2012-5068", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865348" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5068" }, { "category": "external", "summary": "RHBZ#865348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865348" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5068", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5068" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)" }, { "cve": "CVE-2012-5069", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865531" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Executors state handling issues (Concurrency, 7189103)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5069" }, { "category": "external", "summary": "RHBZ#865531", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865531" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5069", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5069" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5069" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: Executors state handling issues (Concurrency, 7189103)" }, { "cve": "CVE-2012-5071", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865519" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5071" }, { "category": "external", "summary": "RHBZ#865519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865519" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5071", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5071" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)" }, { "cve": "CVE-2012-5072", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865365" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5072" }, { "category": "external", "summary": "RHBZ#865365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5072", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5072" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)" }, { "cve": "CVE-2012-5073", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865357" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: LogManager security bypass (Libraries, 7169884)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5073" }, { "category": "external", "summary": "RHBZ#865357", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865357" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5073", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5073" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: LogManager security bypass (Libraries, 7169884)" }, { "cve": "CVE-2012-5075", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865363" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5075" }, { "category": "external", "summary": "RHBZ#865363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865363" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5075", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5075" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)" }, { "cve": "CVE-2012-5079", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865568" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5079" }, { "category": "external", "summary": "RHBZ#865568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5079", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5079" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)" }, { "cve": "CVE-2012-5081", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865370" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JSSE denial of service (JSSE, 7186286)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5081" }, { "category": "external", "summary": "RHBZ#865370", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865370" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5081", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5081" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JSSE denial of service (JSSE, 7186286)" }, { "cve": "CVE-2012-5083", "discovery_date": "2012-10-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "867193" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5083" }, { "category": "external", "summary": "RHBZ#867193", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=867193" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5083", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5083" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5083" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability (2D)" }, { "cve": "CVE-2012-5084", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865511" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5084" }, { "category": "external", "summary": "RHBZ#865511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865511" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5084", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5084" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5084" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)" }, { "cve": "CVE-2012-5089", "discovery_date": "2012-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "865514" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5089" }, { "category": "external", "summary": "RHBZ#865514", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=865514" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5089", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5089" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5089" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)" }, { "cve": "CVE-2013-0169", "discovery_date": "2013-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907589" } ], "notes": [ { "category": "description", "text": "The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the \"Lucky Thirteen\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "SSL/TLS: CBC padding timing attack (lucky-13)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0169" }, { "category": "external", "summary": "RHBZ#907589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0169", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0169" }, { "category": "external", "summary": "http://www.isg.rhul.ac.uk/tls/", "url": "http://www.isg.rhul.ac.uk/tls/" }, { "category": "external", "summary": "http://www.openssl.org/news/secadv_20130205.txt", "url": "http://www.openssl.org/news/secadv_20130205.txt" }, { "category": "external", "summary": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released", "url": "https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released" } ], "release_date": "2013-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "category": "workaround", "details": "On OpenShift Container Platform 3.11 it\u0027s possible to edit the list of cipher suites offered by the router when performing \u0027edge\u0027, or \u0027re-encrypt\u0027 TLS modes. Please follow the documentation [1], and [2] to remove the vulnerable CBC ciphers use the modern, or intermediate cipher suites outlined by Mozilla instead [3]. In \u0027passthrough\u0027 mode TLS termination occurs in the application so that is another way to mitigate the vulnerability.\n[1] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#obtaining-router-configuration-template\n[2] https://docs.openshift.com/container-platform/3.11/install_config/router/customized_haproxy_router.html#using-configmap-replace-template\n[3] https://wiki.mozilla.org/Security/Server_Side_TLS", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "SSL/TLS: CBC padding timing attack (lucky-13)" }, { "cve": "CVE-2013-0351", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906923" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0351" }, { "category": "external", "summary": "RHBZ#906923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906923" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0351", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0351" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0351" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0401", "discovery_date": "2013-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "920245" } ], "notes": [ { "category": "description", "text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0401" }, { "category": "external", "summary": "RHBZ#920245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920245" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0401" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0401" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305)" }, { "cve": "CVE-2013-0409", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907226" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0409" }, { "category": "external", "summary": "RHBZ#907226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0409", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0409" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (JMX)" }, { "cve": "CVE-2013-0419", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906918" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0419" }, { "category": "external", "summary": "RHBZ#906918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0419" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0423", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906921" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0423" }, { "category": "external", "summary": "RHBZ#906921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0423", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0423" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0423" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0424", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906813" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0424" }, { "category": "external", "summary": "RHBZ#906813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0424" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318)" }, { "cve": "CVE-2013-0425", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907344" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0425" }, { "category": "external", "summary": "RHBZ#907344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0425", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0425" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0425" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664509)" }, { "cve": "CVE-2013-0426", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907346" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect \"access control checks\" in the logging API that allow remote attackers to bypass Java sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0426" }, { "category": "external", "summary": "RHBZ#907346", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907346" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0426", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0426" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: logging insufficient access control checks (Libraries, 6664528)" }, { "cve": "CVE-2013-0427", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907455" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0427" }, { "category": "external", "summary": "RHBZ#907455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0427" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: invalid threads subject to interrupts (Libraries, 6776941)" }, { "cve": "CVE-2013-0428", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907207" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"incorrect checks for proxy classes\" in the Reflection API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0428" }, { "category": "external", "summary": "RHBZ#907207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0428", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0428" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0428" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29)" }, { "cve": "CVE-2013-0432", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907219" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient clipboard access premission checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0432" }, { "category": "external", "summary": "RHBZ#907219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient clipboard access premission checks (AWT, 7186952)" }, { "cve": "CVE-2013-0433", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907456" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0433" }, { "category": "external", "summary": "RHBZ#907456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: InetSocketAddress serialization issue (Networking, 7201071)" }, { "cve": "CVE-2013-0434", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907453" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0434" }, { "category": "external", "summary": "RHBZ#907453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0434", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0434" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0434" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235)" }, { "cve": "CVE-2013-0435", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906892" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and \"Better handling of UI elements.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0435" }, { "category": "external", "summary": "RHBZ#906892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068)" }, { "cve": "CVE-2013-0438", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906935" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0438" }, { "category": "external", "summary": "RHBZ#906935", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906935" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0438", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0438" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0438" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0440", "discovery_date": "2012-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "859140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0440" }, { "category": "external", "summary": "RHBZ#859140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=859140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393)" }, { "cve": "CVE-2013-0441", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907458" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka \"missing serialization restriction.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing serialization restriction (CORBA, 7201066)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0441" }, { "category": "external", "summary": "RHBZ#907458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0441", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0441" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0441" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing serialization restriction (CORBA, 7201066)" }, { "cve": "CVE-2013-0442", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906899" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0442" }, { "category": "external", "summary": "RHBZ#906899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 7192977)" }, { "cve": "CVE-2013-0443", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907340" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a \"small subgroup attack\" to force the use of weak session keys or obtain sensitive information about the private key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0443" }, { "category": "external", "summary": "RHBZ#907340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392)" }, { "cve": "CVE-2013-0445", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906900" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of \"privileges of the code\" that bypasses the sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0445" }, { "category": "external", "summary": "RHBZ#906900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0445", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0445" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0445" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient privilege checking issue (AWT, 8001057)" }, { "cve": "CVE-2013-0446", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906916" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0446" }, { "category": "external", "summary": "RHBZ#906916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-0450", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906911" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of \"access control context\" in the JMX RequiredModelMBean class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0450" }, { "category": "external", "summary": "RHBZ#906911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537)" }, { "cve": "CVE-2013-0809", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917550" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-0809" }, { "category": "external", "summary": "RHBZ#917550", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917550" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-0809", "url": "https://www.cve.org/CVERecord?id=CVE-2013-0809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0809" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Specially crafted sample model integer overflow (2D, 8007014)" }, { "cve": "CVE-2013-1473", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906933" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1473" }, { "category": "external", "summary": "RHBZ#906933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 and 7u13 (Deployment)" }, { "cve": "CVE-2013-1476", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907457" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via \"certain value handler constructors.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1476" }, { "category": "external", "summary": "RHBZ#907457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1476", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1476" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631)" }, { "cve": "CVE-2013-1478", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906894" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" that can trigger an integer overflow and memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1478" }, { "category": "external", "summary": "RHBZ#906894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1478", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1478" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1478" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (2D, 8001972)" }, { "cve": "CVE-2013-1480", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "906904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient validation of raster parameters\" in awt_parseImage.c, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1480" }, { "category": "external", "summary": "RHBZ#906904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=906904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1480", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1480" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1480" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)" }, { "cve": "CVE-2013-1481", "discovery_date": "2013-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "907224" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u39 (Sound)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1481" }, { "category": "external", "summary": "RHBZ#907224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=907224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1481", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1481" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1481" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013-1841061.html" } ], "release_date": "2013-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u39 (Sound)" }, { "cve": "CVE-2013-1486", "discovery_date": "2013-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913014" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1486" }, { "category": "external", "summary": "RHBZ#913014", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913014" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1486", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1486" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1486" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MBeanServer insufficient privilege restrictions (JMX, 8006446)" }, { "cve": "CVE-2013-1487", "discovery_date": "2013-02-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "913030" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1487" }, { "category": "external", "summary": "RHBZ#913030", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=913030" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1487", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1487" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1487" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html" } ], "release_date": "2013-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u41 and 7u15 (Deployment)" }, { "cve": "CVE-2013-1491", "discovery_date": "2013-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "920248" } ], "notes": [ { "category": "description", "text": "The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to execute arbitrary code via vectors related to 2D, as demonstrated by Joshua Drake during a Pwn2Own competition at CanSecWest 2013.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1491" }, { "category": "external", "summary": "RHBZ#920248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=920248" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1491", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1491" } ], "release_date": "2013-03-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified sanbox bypass (CanSecWest 2013, 2D)" }, { "cve": "CVE-2013-1493", "discovery_date": "2013-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "917553" } ], "notes": [ { "category": "description", "text": "The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1493" }, { "category": "external", "summary": "RHBZ#917553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=917553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1493", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1493" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1493" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2013-1493-1915081.html" } ], "release_date": "2013-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: CMM malformed raster memory corruption (2D, 8007675)" }, { "acknowledgments": [ { "names": [ "Tim Brown" ] } ], "cve": "CVE-2013-1500", "discovery_date": "2013-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975148" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Insecure shared memory permissions (2D, 8001034)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1500" }, { "category": "external", "summary": "RHBZ#975148", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975148" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1500", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1500" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1500" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: Insecure shared memory permissions (2D, 8001034)" }, { "cve": "CVE-2013-1537", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952387" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform \"dynamic class downloading\" and execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: remote code loading enabled by default (RMI, 8001040)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1537" }, { "category": "external", "summary": "RHBZ#952387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952387" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1537", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1537" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: remote code loading enabled by default (RMI, 8001040)" }, { "cve": "CVE-2013-1540", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953166" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2433.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1540" }, { "category": "external", "summary": "RHBZ#953166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1540", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1540" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1540" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-1557", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952648" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"missing security restrictions\" in the LogStream.setDefaultStream method.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1557" }, { "category": "external", "summary": "RHBZ#952648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952648" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1557", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1557" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329)" }, { "cve": "CVE-2013-1563", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953172" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1563" }, { "category": "external", "summary": "RHBZ#953172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953172" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1563", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install)" }, { "cve": "CVE-2013-1569", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952711" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"checking of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1569" }, { "category": "external", "summary": "RHBZ#952711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1569", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1569" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1569" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994)" }, { "acknowledgments": [ { "names": [ "US-CERT" ] } ], "cve": "CVE-2013-1571", "discovery_date": "2013-06-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "973474" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-1571" }, { "category": "external", "summary": "RHBZ#973474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=973474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-1571", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1571" }, { "category": "external", "summary": "http://www.kb.cert.org/vuls/id/225657", "url": "http://www.kb.cert.org/vuls/id/225657" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Frame injection in generated HTML (Javadoc, 8012375)" }, { "cve": "CVE-2013-2383", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952708" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"handling of [a] glyph table\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2383" }, { "category": "external", "summary": "RHBZ#952708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952708" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2383", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2383" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2383" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986)" }, { "cve": "CVE-2013-2384", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952709" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font layout\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2384" }, { "category": "external", "summary": "RHBZ#952709", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952709" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2384", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2384" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987)" }, { "cve": "CVE-2013-2394", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953265" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2432 and CVE-2013-1491.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2394" }, { "category": "external", "summary": "RHBZ#953265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953265" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2394", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2394" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2394" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)" }, { "cve": "CVE-2013-2407", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975127" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"XML security and the class loader.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2407" }, { "category": "external", "summary": "RHBZ#975127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975127" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2407", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2407" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2407" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Integrate Apache Santuario, rework class loader (Libraries, 6741606, 8008744)" }, { "cve": "CVE-2013-2412", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975144" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JConsole SSL support (Serviceability, 8003703)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2412" }, { "category": "external", "summary": "RHBZ#975144", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975144" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2412", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2412" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2412" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JConsole SSL support (Serviceability, 8003703)" }, { "cve": "CVE-2013-2417", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952657" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2417" }, { "category": "external", "summary": "RHBZ#952657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952657" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2417", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2417" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2417" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724)" }, { "cve": "CVE-2013-2418", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953267" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2418" }, { "category": "external", "summary": "RHBZ#953267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953267" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2418", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2418" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2418" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2419", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952656" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"font processing errors\" in the International Components for Unicode (ICU) Layout Engine before 51.2.", "title": "Vulnerability description" }, { "category": "summary", "text": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2419" }, { "category": "external", "summary": "RHBZ#952656", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952656" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2419", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2419" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2419" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "ICU: Layout Engine font processing errors (JDK 2D, 8001031)" }, { "cve": "CVE-2013-2420", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952638" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient \"validation of images\" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: image processing vulnerability (2D, 8007617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2420" }, { "category": "external", "summary": "RHBZ#952638", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952638" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2420", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2420" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2420" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: image processing vulnerability (2D, 8007617)" }, { "cve": "CVE-2013-2422", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952642" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2422" }, { "category": "external", "summary": "RHBZ#952642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952642" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2422", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2422" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857)" }, { "cve": "CVE-2013-2424", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952509" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"insufficient class access checks\" when \"creating new instances\" using MBeanInstantiator.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2424" }, { "category": "external", "summary": "RHBZ#952509", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952509" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2424", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2424" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2424" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435)" }, { "cve": "CVE-2013-2429", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952521" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageWriter state corruption\" when using native code, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2429" }, { "category": "external", "summary": "RHBZ#952521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2429", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2429" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2429" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918)" }, { "cve": "CVE-2013-2430", "discovery_date": "2013-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "952524" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"JPEGImageReader state corruption\" when using native code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2430" }, { "category": "external", "summary": "RHBZ#952524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=952524" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2430", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2430" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2430" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667)" }, { "cve": "CVE-2013-2432", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953269" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2394 and CVE-2013-1491.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2432" }, { "category": "external", "summary": "RHBZ#953269", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953269" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2432", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2432" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D)" }, { "cve": "CVE-2013-2433", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953270" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-1540.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2433" }, { "category": "external", "summary": "RHBZ#953270", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953270" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2433", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2433" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2433" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2435", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953273" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2435" }, { "category": "external", "summary": "RHBZ#953273", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953273" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2435", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2435" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2437", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975773" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2437" }, { "category": "external", "summary": "RHBZ#975773", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975773" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2437", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2437" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2440", "discovery_date": "2013-04-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "953275" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2435.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2440" }, { "category": "external", "summary": "RHBZ#953275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2440", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2440" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuapr2013-1928497.html" } ], "release_date": "2013-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)" }, { "cve": "CVE-2013-2442", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975770" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2466 and CVE-2013-2468.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2442" }, { "category": "external", "summary": "RHBZ#975770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2442", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2442" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2443", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975137" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect \"checking order\" within the AccessControlContext class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2443" }, { "category": "external", "summary": "RHBZ#975137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975137" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2443", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2443" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2443" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: AccessControlContext check order issue (Libraries, 8001330)" }, { "cve": "CVE-2013-2444", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975131" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not \"properly manage and restrict certain resources related to the processing of fonts,\" possibly involving temporary files.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Resource denial of service (AWT, 8001038)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2444" }, { "category": "external", "summary": "RHBZ#975131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975131" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2444", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2444" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2444" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Resource denial of service (AWT, 8001038)" }, { "cve": "CVE-2013-2446", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975132" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: output stream access restrictions (CORBA, 8000642)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2446" }, { "category": "external", "summary": "RHBZ#975132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975132" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2446", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2446" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2446" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: output stream access restrictions (CORBA, 8000642)" }, { "cve": "CVE-2013-2447", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975140" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket\u0027s local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Prevent revealing the local address (Networking, 8001318)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2447" }, { "category": "external", "summary": "RHBZ#975140", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975140" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2447", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2447" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Prevent revealing the local address (Networking, 8001318)" }, { "cve": "CVE-2013-2448", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975125" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient \"access restrictions\" and \"robustness of sound classes.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Better access restrictions (Sound, 8006328)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2448" }, { "category": "external", "summary": "RHBZ#975125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2448", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2448" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Better access restrictions (Sound, 8006328)" }, { "cve": "CVE-2013-2450", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975141" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2450" }, { "category": "external", "summary": "RHBZ#975141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2450", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2450" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ObjectStreamClass circular reference denial of service (Serialization, 8000638)" }, { "cve": "CVE-2013-2451", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975146" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: exclusive port binding (Networking, 7170730)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2451" }, { "category": "external", "summary": "RHBZ#975146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2451", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2451" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2451" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: exclusive port binding (Networking, 7170730)" }, { "cve": "CVE-2013-2452", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975138" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to \"network address handling in virtual machine identifiers\" and the lack of \"unique and unpredictable IDs\" in the java.rmi.dgc.VMID class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Unique VMIDs (Libraries, 8001033)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2452" }, { "category": "external", "summary": "RHBZ#975138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975138" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2452", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2452" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2452" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Unique VMIDs (Libraries, 8001033)" }, { "cve": "CVE-2013-2453", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975134" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for \"package access\" by the MBeanServer Introspector.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2453" }, { "category": "external", "summary": "RHBZ#975134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975134" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2453", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2453" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2453" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: MBeanServer Introspector package access (JMX, 8008124)" }, { "cve": "CVE-2013-2454", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975129" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2454" }, { "category": "external", "summary": "RHBZ#975129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975129" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2454", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2454" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2454" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: SerialJavaObject package restriction (JDBC, 8009554)" }, { "cve": "CVE-2013-2455", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975139" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: getEnclosing* checks (Libraries, 8007812)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2455" }, { "category": "external", "summary": "RHBZ#975139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2455", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2455" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2455" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: getEnclosing* checks (Libraries, 8007812)" }, { "cve": "CVE-2013-2456", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975142" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2456" }, { "category": "external", "summary": "RHBZ#975142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975142" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2456", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2456" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2456" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: ObjectOutputStream access checks (Serialization, 8008132)" }, { "cve": "CVE-2013-2457", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975133" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of \"certain class checks\" that allows remote attackers to bypass intended class restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Proper class checking (JMX, 8008120)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2457" }, { "category": "external", "summary": "RHBZ#975133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975133" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2457", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2457" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2457" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Proper class checking (JMX, 8008120)" }, { "cve": "CVE-2013-2459", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975121" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"integer overflow checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2459" }, { "category": "external", "summary": "RHBZ#975121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975121" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2459", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2459" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Various AWT integer overflow checks (AWT, 8009071)" }, { "cve": "CVE-2013-2463", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975115" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image attribute verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image attribute verification (2D, 8012438)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2463" }, { "category": "external", "summary": "RHBZ#975115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975115" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2463", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2463" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image attribute verification (2D, 8012438)" }, { "cve": "CVE-2013-2464", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975757" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, and CVE-2013-2473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2464" }, { "category": "external", "summary": "RHBZ#975757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2464", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2464" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2464" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (2D)" }, { "cve": "CVE-2013-2465", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975118" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image channel verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image channel verification (2D, 8012597)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2465" }, { "category": "external", "summary": "RHBZ#975118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975118" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2465", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2465" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-28T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image channel verification (2D, 8012597)" }, { "cve": "CVE-2013-2466", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975764" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2468.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2466" }, { "category": "external", "summary": "RHBZ#975764", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975764" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2466", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2466" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2468", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975761" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2466.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2468" }, { "category": "external", "summary": "RHBZ#975761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2468", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2468" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 7u25 (Deployment)" }, { "cve": "CVE-2013-2469", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975120" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect image layout verification\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect image layout verification (2D, 8012601)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2469" }, { "category": "external", "summary": "RHBZ#975120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975120" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2469", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2469" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect image layout verification (2D, 8012601)" }, { "cve": "CVE-2013-2470", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975099" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"ImagingLib byte lookup processing.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2470" }, { "category": "external", "summary": "RHBZ#975099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2470", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2470" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: ImagingLib byte lookup processing (2D, 8011243)" }, { "cve": "CVE-2013-2471", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975102" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect IntegerComponentRaster size checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2471" }, { "category": "external", "summary": "RHBZ#975102", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975102" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2471", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2471" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect IntegerComponentRaster size checks (2D, 8011248)" }, { "cve": "CVE-2013-2472", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975107" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ShortBandedRaster size checks\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2472" }, { "category": "external", "summary": "RHBZ#975107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975107" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2472", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2472" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2472" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect ShortBandedRaster size checks (2D, 8011253)" }, { "cve": "CVE-2013-2473", "discovery_date": "2013-06-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975110" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to \"Incorrect ByteBandedRaster size checks\" in 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-2473" }, { "category": "external", "summary": "RHBZ#975110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975110" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-2473", "url": "https://www.cve.org/CVERecord?id=CVE-2013-2473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2473" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Incorrect ByteBandedRaster size checks (2D, 8011257)" }, { "cve": "CVE-2013-3743", "discovery_date": "2013-06-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "975767" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 45 and earlier and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-3743" }, { "category": "external", "summary": "RHBZ#975767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=975767" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-3743", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3743" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-3743" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2013-1899847.html" } ], "release_date": "2013-06-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-10-23T16:26:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el5_9.x86_64", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.src", "6Server-Satellite:java-1.6.0-ibm-1:1.6.0.14.0-1jpp.1.el6_4.x86_64", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.s390x", "6Server-Satellite:java-1.6.0-ibm-devel-1:1.6.0.14.0-1jpp.1.el6_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u51 and 5u51 (AWT)" } ] }
rhsa-2012_1080
Vulnerability from csaf_redhat
Published
2012-07-16 15:47
Modified
2024-11-14 11:31
Summary
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
Notes
Topic
Updated java-1.4.2-ibm-sap packages that fix several security issues are
now available for Red Hat Enterprise Linux 5 and 6 for SAP.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The IBM Java SE version 1.4.2 release includes the IBM Java 1.4.2 Runtime
Environment and the IBM Java 1.4.2 Software Development Kit.
This update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime
Environment and the IBM Java 1.4.2 Software Development Kit. Detailed
vulnerability descriptions are linked from the IBM "Security alerts" page,
listed in the References section. (CVE-2011-3563, CVE-2012-0499,
CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506)
All users of java-1.4.2-ibm-sap are advised to upgrade to these updated
packages, which contain the IBM 1.4.2 SR13-FP12 Java release. All running
instances of IBM Java must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-ibm-sap packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5 and 6 for SAP.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The IBM Java SE version 1.4.2 release includes the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime\nEnvironment and the IBM Java 1.4.2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3563, CVE-2012-0499,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506)\n\nAll users of java-1.4.2-ibm-sap are advised to upgrade to these updated\npackages, which contain the IBM 1.4.2 SR13-FP12 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1080", "url": "https://access.redhat.com/errata/RHSA-2012:1080" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1080.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-ibm-sap security update", "tracking": { "current_release_date": "2024-11-14T11:31:34+00:00", "generator": { "date": "2024-11-14T11:31:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:1080", "initial_release_date": "2012-07-16T15:47:00+00:00", "revision_history": [ { "date": "2012-07-16T15:47:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-07-16T15:55:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:31:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 5 Server for SAP", "product": { "name": "RHEL 5 Server for SAP", "product_id": "5Server-SAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_sap:5" } } } ], "category": "product_family", "name": "RHEL for SAP" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.12.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.12.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.12.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.12.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.12.sap-1jpp.2.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3563", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3563" }, { "category": "external", "summary": "RHBZ#789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-16T15:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1080" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)" }, { "cve": "CVE-2012-0499", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790722" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0499" }, { "category": "external", "summary": "RHBZ#790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-16T15:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1080" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0502", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789297" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0502" }, { "category": "external", "summary": "RHBZ#789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-16T15:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1080" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)" }, { "cve": "CVE-2012-0503", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788976" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0503" }, { "category": "external", "summary": "RHBZ#788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-16T15:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1080" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)" }, { "cve": "CVE-2012-0505", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0505" }, { "category": "external", "summary": "RHBZ#789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-16T15:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1080" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)" }, { "cve": "CVE-2012-0506", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0506" }, { "category": "external", "summary": "RHBZ#789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-07-16T15:47:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1080" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.12.sap-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)" } ] }
rhsa-2012_0508
Vulnerability from csaf_redhat
Published
2012-04-23 16:52
Modified
2024-11-14 11:30
Summary
Red Hat Security Advisory: java-1.5.0-ibm security update
Notes
Topic
Updated java-1.5.0-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and
the IBM Java 2 Software Development Kit.
This update fixes several vulnerabilities in the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit. Detailed
vulnerability descriptions are linked from the IBM "Security alerts" page,
listed in the References section. (CVE-2011-3389, CVE-2011-3557,
CVE-2011-3560, CVE-2011-3563, CVE-2012-0498, CVE-2012-0499, CVE-2012-0501,
CVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507)
All users of java-1.5.0-ibm are advised to upgrade to these updated
packages, containing the IBM 1.5.0 SR13-FP1 Java release. All running
instances of IBM Java must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.5.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. Detailed\nvulnerability descriptions are linked from the IBM \"Security alerts\" page,\nlisted in the References section. (CVE-2011-3389, CVE-2011-3557,\nCVE-2011-3560, CVE-2011-3563, CVE-2012-0498, CVE-2012-0499, CVE-2012-0501,\nCVE-2012-0502, CVE-2012-0503, CVE-2012-0505, CVE-2012-0506, CVE-2012-0507)\n\nAll users of java-1.5.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.5.0 SR13-FP1 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0508", "url": "https://access.redhat.com/errata/RHSA-2012:0508" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0508.json" } ], "title": "Red Hat Security Advisory: java-1.5.0-ibm security update", "tracking": { "current_release_date": "2024-11-14T11:30:58+00:00", "generator": { "date": "2024-11-14T11:30:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0508", "initial_release_date": "2012-04-23T16:52:00+00:00", "revision_history": [ { "date": "2012-04-23T16:52:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-11-14T19:09:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:30:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.13.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.13.1-1jpp.2.el6_2?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3389", "discovery_date": "2011-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "737506" } ], "notes": [ { "category": "description", "text": "The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a \"BEAST\" attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of, and tracking, the Rizzo/Duong chosen plain text attack on SSL/TLS 1.0, also known as \"BEAST\". This issue has been assigned CVE-2011-3389. This attack uses web browser extensions to exploit a weakness in SSL/TLS cipher-block chaining (CBC), allowing a man-in-the-middle attacker to recover certain session information, such as cookie data, from what should be a secure connection.\n\nThe research shows two ways that an attacker could mount an attack. In both cases the attacker needs access to the data stream from the web browser to the server while a user visits a malicious website using a browser. The attacker may then be able to determine a portion of the data the browser sends to the server by making a large number of requests over a period of time. This data could include information such as an authentication cookie.\n\nThe first method of attack involves using WebSockets. Currently, Red Hat does not ship any products that allow an attack using WebSockets to be successful. We are planning to update Firefox to version 7, which contains protections in the WebSocket code that prevents this particular attack from being effective. \n\nThe second method of attack involves using a malicious Java applet. In order for the attack to be successful, the attacker would need to circumvent the Same Origin Policy (SOP) controls in Java. The researchers claim to have found a flaw in the Java SOP and we will issue updates to correct this flaw as suitable fixes are available.\n\nWe are in contact with various upstream projects regarding this attack. As a precautionary measure, we plan to update the Network Security Services (NSS), GnuTLS, and OpenSSL packages as suitable fixes are available.\n\nWe will continue to track this issue and take any appropriate actions as needed.\n\nThis statement and any updates to it is available at:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=737506", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3389" }, { "category": "external", "summary": "RHBZ#737506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=737506" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3389" } ], "release_date": "2011-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST)" }, { "cve": "CVE-2011-3557", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745464" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3557" }, { "category": "external", "summary": "RHBZ#745464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3557" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: RMI registry privileged code execution (RMI, 7083012)" }, { "cve": "CVE-2011-3560", "discovery_date": "2011-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "745379" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3560" }, { "category": "external", "summary": "RHBZ#745379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=745379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3560" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html" } ], "release_date": "2011-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: missing checkSetFactory calls in HttpsURLConnection (JSSE, 7096936)" }, { "cve": "CVE-2011-3563", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3563" }, { "category": "external", "summary": "RHBZ#789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)" }, { "cve": "CVE-2012-0498", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790720" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0498" }, { "category": "external", "summary": "RHBZ#790720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0498", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0498" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0498" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0499", "discovery_date": "2012-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "790722" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0499" }, { "category": "external", "summary": "RHBZ#790722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0499", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0499" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0499" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u31 and 7u3 (2D)" }, { "cve": "CVE-2012-0501", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788624" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0501" }, { "category": "external", "summary": "RHBZ#788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)" }, { "cve": "CVE-2012-0502", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789297" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0502" }, { "category": "external", "summary": "RHBZ#789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)" }, { "cve": "CVE-2012-0503", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788976" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0503" }, { "category": "external", "summary": "RHBZ#788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)" }, { "cve": "CVE-2012-0505", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0505" }, { "category": "external", "summary": "RHBZ#789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)" }, { "cve": "CVE-2012-0506", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0506" }, { "category": "external", "summary": "RHBZ#789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)" }, { "cve": "CVE-2012-0507", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0507" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0507" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-04-23T16:52:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0508" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Client-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-accessibility-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.i386", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.s390x", "5Server-Supplementary-5.8.Z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.1.el5.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Client-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6ComputeNode-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Server-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-demo-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-devel-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-javacomm-1:1.5.0.13.1-1jpp.2.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-jdbc-1:1.5.0.13.1-1jpp.2.el6_2.s390", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-plugin-1:1.5.0.13.1-1jpp.2.el6_2.ppc", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.ppc64", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.s390x", "6Workstation-Supplementary-6.2.z:java-1.5.0-ibm-src-1:1.5.0.13.1-1jpp.2.el6_2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" } ] }
rhsa-2012_0322
Vulnerability from csaf_redhat
Published
2012-02-21 21:57
Modified
2024-11-14 11:30
Summary
Red Hat Security Advisory: java-1.6.0-openjdk security update
Notes
Topic
Updated java-1.6.0-openjdk packages that fix several security issues are
now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
These packages provide the OpenJDK 6 Java Runtime Environment and the
OpenJDK 6 Software Development Kit.
It was discovered that Java2D did not properly check graphics rendering
objects before passing them to the native renderer. Malicious input, or an
untrusted Java application or applet could use this flaw to crash the Java
Virtual Machine (JVM), or bypass Java sandbox restrictions. (CVE-2012-0497)
It was discovered that the exception thrown on deserialization failure did
not always contain a proper identification of the cause of the failure. An
untrusted Java application or applet could use this flaw to bypass Java
sandbox restrictions. (CVE-2012-0505)
The AtomicReferenceArray class implementation did not properly check if
the array was of the expected Object[] type. A malicious Java application
or applet could use this flaw to bypass Java sandbox restrictions.
(CVE-2011-3571)
It was discovered that the use of TimeZone.setDefault() was not restricted
by the SecurityManager, allowing an untrusted Java application or applet to
set a new default time zone, and hence bypass Java sandbox restrictions.
(CVE-2012-0503)
The HttpServer class did not limit the number of headers read from HTTP
requests. A remote attacker could use this flaw to make an application
using HttpServer use an excessive amount of CPU time via a
specially-crafted request. This update introduces a header count limit
controlled using the sun.net.httpserver.maxReqHeaders property. The default
value is 200. (CVE-2011-5035)
The Java Sound component did not properly check buffer boundaries.
Malicious input, or an untrusted Java application or applet could use this
flaw to cause the Java Virtual Machine (JVM) to crash or disclose a portion
of its memory. (CVE-2011-3563)
A flaw was found in the AWT KeyboardFocusManager that could allow an
untrusted Java application or applet to acquire keyboard focus and possibly
steal sensitive information. (CVE-2012-0502)
It was discovered that the CORBA (Common Object Request Broker
Architecture) implementation in Java did not properly protect repository
identifiers on certain CORBA objects. This could have been used to modify
immutable object data. (CVE-2012-0506)
An off-by-one flaw, causing a stack overflow, was found in the unpacker for
ZIP files. A specially-crafted ZIP archive could cause the Java Virtual
Machine (JVM) to crash when opened. (CVE-2012-0501)
This erratum also upgrades the OpenJDK package to IcedTea6 1.10.6. Refer to
the NEWS file, linked to in the References, for further information.
All users of java-1.6.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nIt was discovered that Java2D did not properly check graphics rendering\nobjects before passing them to the native renderer. Malicious input, or an\nuntrusted Java application or applet could use this flaw to crash the Java\nVirtual Machine (JVM), or bypass Java sandbox restrictions. (CVE-2012-0497)\n\nIt was discovered that the exception thrown on deserialization failure did\nnot always contain a proper identification of the cause of the failure. An\nuntrusted Java application or applet could use this flaw to bypass Java\nsandbox restrictions. (CVE-2012-0505)\n\nThe AtomicReferenceArray class implementation did not properly check if\nthe array was of the expected Object[] type. A malicious Java application\nor applet could use this flaw to bypass Java sandbox restrictions.\n(CVE-2011-3571)\n\nIt was discovered that the use of TimeZone.setDefault() was not restricted\nby the SecurityManager, allowing an untrusted Java application or applet to\nset a new default time zone, and hence bypass Java sandbox restrictions.\n(CVE-2012-0503)\n\nThe HttpServer class did not limit the number of headers read from HTTP\nrequests. A remote attacker could use this flaw to make an application\nusing HttpServer use an excessive amount of CPU time via a\nspecially-crafted request. This update introduces a header count limit\ncontrolled using the sun.net.httpserver.maxReqHeaders property. The default\nvalue is 200. (CVE-2011-5035)\n\nThe Java Sound component did not properly check buffer boundaries.\nMalicious input, or an untrusted Java application or applet could use this\nflaw to cause the Java Virtual Machine (JVM) to crash or disclose a portion\nof its memory. (CVE-2011-3563)\n\nA flaw was found in the AWT KeyboardFocusManager that could allow an\nuntrusted Java application or applet to acquire keyboard focus and possibly\nsteal sensitive information. (CVE-2012-0502)\n\nIt was discovered that the CORBA (Common Object Request Broker\nArchitecture) implementation in Java did not properly protect repository\nidentifiers on certain CORBA objects. This could have been used to modify\nimmutable object data. (CVE-2012-0506)\n\nAn off-by-one flaw, causing a stack overflow, was found in the unpacker for\nZIP files. A specially-crafted ZIP archive could cause the Java Virtual\nMachine (JVM) to crash when opened. (CVE-2012-0501)\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.10.6. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0322", "url": "https://access.redhat.com/errata/RHSA-2012:0322" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://icedtea.classpath.org/hg/release/icedtea6-1.10/file/icedtea6-1.10.6/NEWS", "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.10/file/icedtea6-1.10.6/NEWS" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "788606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788606" }, { "category": "external", "summary": "788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0322.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-openjdk security update", "tracking": { "current_release_date": "2024-11-14T11:30:43+00:00", "generator": { "date": "2024-11-14T11:30:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0322", "initial_release_date": "2012-02-21T21:57:00+00:00", "revision_history": [ { "date": "2012-02-21T21:57:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-02-21T21:57:32+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:30:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.25.1.10.6.el5_8?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.25.1.10.6.el5_8?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.25.1.10.6.el5_8?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.25.1.10.6.el5_8?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.25.1.10.6.el5_8?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.25.1.10.6.el5_8?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.25.1.10.6.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.25.1.10.6.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.25.1.10.6.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.25.1.10.6.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.25.1.10.6.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.25.1.10.6.el5_8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.25.1.10.6.el5_8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3563", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3563" }, { "category": "external", "summary": "RHBZ#789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0322" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)" }, { "cve": "CVE-2011-3571", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Virtual Desktop Infrastructure (VDI) component in Oracle Virtualization 3.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Session. NOTE: this CVE identifier was accidentally used for a Concurrency issue in Java Runtime Environment, but that issue has been reassigned to CVE-2012-0507.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3571" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3571", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3571" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0322" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" }, { "cve": "CVE-2011-5035", "discovery_date": "2011-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771283" } ], "notes": [ { "category": "description", "text": "Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.", "title": "Vulnerability description" }, { "category": "summary", "text": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. This issue affects the GlassFish Web Container component. This\ncomponent is not shipped with any Red Hat products. JBoss Web and Tomcat\nprovide the web container used in all JBoss products.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5035" }, { "category": "external", "summary": "RHBZ#771283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5035", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5035" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035" } ], "release_date": "2011-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0322" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)" }, { "cve": "CVE-2012-0497", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789301" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0497" }, { "category": "external", "summary": "RHBZ#789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0497", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0497" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0322" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)" }, { "cve": "CVE-2012-0501", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788624" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0501" }, { "category": "external", "summary": "RHBZ#788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0322" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)" }, { "cve": "CVE-2012-0502", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789297" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0502" }, { "category": "external", "summary": "RHBZ#789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0322" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)" }, { "cve": "CVE-2012-0503", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788976" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0503" }, { "category": "external", "summary": "RHBZ#788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0322" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)" }, { "cve": "CVE-2012-0505", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0505" }, { "category": "external", "summary": "RHBZ#789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0322" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)" }, { "cve": "CVE-2012-0506", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0506" }, { "category": "external", "summary": "RHBZ#789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0322" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)" }, { "cve": "CVE-2012-0507", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0507" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0507" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:57:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0322" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.25.1.10.6.el5_8.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" } ] }
rhsa-2012_0135
Vulnerability from csaf_redhat
Published
2012-02-14 23:37
Modified
2024-11-14 11:30
Summary
Red Hat Security Advisory: java-1.6.0-openjdk security update
Notes
Topic
Updated java-1.6.0-openjdk packages that fix several security issues are
now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
These packages provide the OpenJDK 6 Java Runtime Environment and the
OpenJDK 6 Software Development Kit.
It was discovered that Java2D did not properly check graphics rendering
objects before passing them to the native renderer. Malicious input, or an
untrusted Java application or applet could use this flaw to crash the Java
Virtual Machine (JVM), or bypass Java sandbox restrictions. (CVE-2012-0497)
It was discovered that the exception thrown on deserialization failure did
not always contain a proper identification of the cause of the failure. An
untrusted Java application or applet could use this flaw to bypass Java
sandbox restrictions. (CVE-2012-0505)
The AtomicReferenceArray class implementation did not properly check if
the array was of the expected Object[] type. A malicious Java application
or applet could use this flaw to bypass Java sandbox restrictions.
(CVE-2011-3571)
It was discovered that the use of TimeZone.setDefault() was not restricted
by the SecurityManager, allowing an untrusted Java application or applet to
set a new default time zone, and hence bypass Java sandbox restrictions.
(CVE-2012-0503)
The HttpServer class did not limit the number of headers read from HTTP
requests. A remote attacker could use this flaw to make an application
using HttpServer use an excessive amount of CPU time via a
specially-crafted request. This update introduces a header count limit
controlled using the sun.net.httpserver.maxReqHeaders property. The default
value is 200. (CVE-2011-5035)
The Java Sound component did not properly check buffer boundaries.
Malicious input, or an untrusted Java application or applet could use this
flaw to cause the Java Virtual Machine (JVM) to crash or disclose a portion
of its memory. (CVE-2011-3563)
A flaw was found in the AWT KeyboardFocusManager that could allow an
untrusted Java application or applet to acquire keyboard focus and possibly
steal sensitive information. (CVE-2012-0502)
It was discovered that the CORBA (Common Object Request Broker
Architecture) implementation in Java did not properly protect repository
identifiers on certain CORBA objects. This could have been used to modify
immutable object data. (CVE-2012-0506)
An off-by-one flaw, causing a stack overflow, was found in the unpacker for
ZIP files. A specially-crafted ZIP archive could cause the Java Virtual
Machine (JVM) to crash when opened. (CVE-2012-0501)
Note: If the web browser plug-in provided by the icedtea-web package was
installed, the issues exposed via Java applets could have been exploited
without user interaction if a user visited a malicious website.
This erratum also upgrades the OpenJDK package to IcedTea6 1.10.6. Refer to
the NEWS file, linked to in the References, for further information.
All users of java-1.6.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nIt was discovered that Java2D did not properly check graphics rendering\nobjects before passing them to the native renderer. Malicious input, or an\nuntrusted Java application or applet could use this flaw to crash the Java\nVirtual Machine (JVM), or bypass Java sandbox restrictions. (CVE-2012-0497)\n\nIt was discovered that the exception thrown on deserialization failure did\nnot always contain a proper identification of the cause of the failure. An\nuntrusted Java application or applet could use this flaw to bypass Java\nsandbox restrictions. (CVE-2012-0505)\n\nThe AtomicReferenceArray class implementation did not properly check if\nthe array was of the expected Object[] type. A malicious Java application\nor applet could use this flaw to bypass Java sandbox restrictions.\n(CVE-2011-3571)\n\nIt was discovered that the use of TimeZone.setDefault() was not restricted\nby the SecurityManager, allowing an untrusted Java application or applet to\nset a new default time zone, and hence bypass Java sandbox restrictions.\n(CVE-2012-0503)\n\nThe HttpServer class did not limit the number of headers read from HTTP\nrequests. A remote attacker could use this flaw to make an application\nusing HttpServer use an excessive amount of CPU time via a\nspecially-crafted request. This update introduces a header count limit\ncontrolled using the sun.net.httpserver.maxReqHeaders property. The default\nvalue is 200. (CVE-2011-5035)\n\nThe Java Sound component did not properly check buffer boundaries.\nMalicious input, or an untrusted Java application or applet could use this\nflaw to cause the Java Virtual Machine (JVM) to crash or disclose a portion\nof its memory. (CVE-2011-3563)\n\nA flaw was found in the AWT KeyboardFocusManager that could allow an\nuntrusted Java application or applet to acquire keyboard focus and possibly\nsteal sensitive information. (CVE-2012-0502)\n\nIt was discovered that the CORBA (Common Object Request Broker\nArchitecture) implementation in Java did not properly protect repository\nidentifiers on certain CORBA objects. This could have been used to modify\nimmutable object data. (CVE-2012-0506)\n\nAn off-by-one flaw, causing a stack overflow, was found in the unpacker for\nZIP files. A specially-crafted ZIP archive could cause the Java Virtual\nMachine (JVM) to crash when opened. (CVE-2012-0501)\n\nNote: If the web browser plug-in provided by the icedtea-web package was\ninstalled, the issues exposed via Java applets could have been exploited\nwithout user interaction if a user visited a malicious website.\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.10.6. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0135", "url": "https://access.redhat.com/errata/RHSA-2012:0135" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://icedtea.classpath.org/hg/release/icedtea6-1.10/file/icedtea6-1.10.6/NEWS", "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.10/file/icedtea6-1.10.6/NEWS" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "788606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788606" }, { "category": "external", "summary": "788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0135.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-openjdk security update", "tracking": { "current_release_date": "2024-11-14T11:30:22+00:00", "generator": { "date": "2024-11-14T11:30:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0135", "initial_release_date": "2012-02-14T23:37:00+00:00", "revision_history": [ { "date": "2012-02-14T23:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-02-14T23:42:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:30:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.43.1.10.6.el6_2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.43.1.10.6.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.43.1.10.6.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.43.1.10.6.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.43.1.10.6.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.43.1.10.6.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.43.1.10.6.el6_2?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.43.1.10.6.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.43.1.10.6.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.43.1.10.6.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.43.1.10.6.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.43.1.10.6.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.43.1.10.6.el6_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3563", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789295" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3563" }, { "category": "external", "summary": "RHBZ#789295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3563" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-14T23:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0135" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: JavaSound incorrect bounds check (Sound, 7088367)" }, { "cve": "CVE-2011-3571", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Virtual Desktop Infrastructure (VDI) component in Oracle Virtualization 3.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Session. NOTE: this CVE identifier was accidentally used for a Concurrency issue in Java Runtime Environment, but that issue has been reassigned to CVE-2012-0507.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3571" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3571", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3571" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-14T23:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0135" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" }, { "cve": "CVE-2011-5035", "discovery_date": "2011-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "771283" } ], "notes": [ { "category": "description", "text": "Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.", "title": "Vulnerability description" }, { "category": "summary", "text": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. This issue affects the GlassFish Web Container component. This\ncomponent is not shipped with any Red Hat products. JBoss Web and Tomcat\nprovide the web container used in all JBoss products.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-5035" }, { "category": "external", "summary": "RHBZ#771283", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-5035", "url": "https://www.cve.org/CVERecord?id=CVE-2011-5035" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-5035" } ], "release_date": "2011-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-14T23:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0135" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "GlassFish: hash table collisions CPU usage DoS (oCERT-2011-003)" }, { "cve": "CVE-2012-0497", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789301" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0497" }, { "category": "external", "summary": "RHBZ#789301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0497", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0497" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0497" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-14T23:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0135" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient checking of the graphics rendering object (2D, 7112642)" }, { "cve": "CVE-2012-0501", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788624" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0501" }, { "category": "external", "summary": "RHBZ#788624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0501", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0501" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-14T23:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0135" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: off-by-one bug in ZIP reading code (JRE, 7118283)" }, { "cve": "CVE-2012-0502", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789297" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0502" }, { "category": "external", "summary": "RHBZ#789297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0502", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0502" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-14T23:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0135" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: KeyboardFocusManager focus stealing (AWT, 7110683)" }, { "cve": "CVE-2012-0503", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788976" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0503" }, { "category": "external", "summary": "RHBZ#788976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0503", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0503" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-14T23:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0135" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unrestricted use of TimeZone.setDefault() (i18n, 7110687)" }, { "cve": "CVE-2012-0505", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789299" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0505" }, { "category": "external", "summary": "RHBZ#789299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0505", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-14T23:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0135" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: incomplete info in the deserialization exception (Serialization, 7110700)" }, { "cve": "CVE-2012-0506", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "789300" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers (CORBA, 7110704)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0506" }, { "category": "external", "summary": "RHBZ#789300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0506", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0506" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-14T23:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0135" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers (CORBA, 7110704)" }, { "cve": "CVE-2012-0507", "discovery_date": "2012-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "788994" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency. NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions. NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0507" }, { "category": "external", "summary": "RHBZ#788994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0507", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0507" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0507" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-14T23:37:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0135" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.43.1.10.6.el6_2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: AtomicReferenceArray insufficient array type check (Concurrency, 7082299)" } ] }
gsd-2012-0505
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2012-0505", "description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "id": "GSD-2012-0505", "references": [ "https://www.suse.com/security/cve/CVE-2012-0505.html", "https://www.debian.org/security/2012/dsa-2420", "https://access.redhat.com/errata/RHSA-2013:1455", "https://access.redhat.com/errata/RHSA-2012:1080", "https://access.redhat.com/errata/RHSA-2012:0702", "https://access.redhat.com/errata/RHSA-2012:0514", "https://access.redhat.com/errata/RHSA-2012:0508", "https://access.redhat.com/errata/RHSA-2012:0322", "https://access.redhat.com/errata/RHSA-2012:0139", "https://access.redhat.com/errata/RHSA-2012:0135", "https://alas.aws.amazon.com/cve/html/CVE-2012-0505.html", "https://linux.oracle.com/cve/CVE-2012-0505.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2012-0505" ], "details": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "id": "GSD-2012-0505", "modified": "2023-12-13T01:20:13.661170Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0505", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "48074", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48074" }, { "name": "HPSBUX02784", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133847939902305\u0026w=2" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "name": "SUSE-SU-2012:1013", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00015.html" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "48692", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48692" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "SUSE-SU-2012:0881", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00007.html" }, { "name": "48589", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48589" }, { "name": "SSRT100805", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "SUSE-SU-2012:0734", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00009.html" }, { "name": "SUSE-SU-2012:0602", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "name": "RHSA-2013:1455", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "SUSE-SU-2012:0603", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" }, { "name": "48073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48073" }, { "name": "48950", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48950" }, { "name": "48948", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48948" }, { "name": "SSRT100871", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133847939902305\u0026w=2" }, { "name": "48915", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48915" }, { "name": "52017", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52017" }, { "name": "HPSBUX02757", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133364885411663\u0026w=2" }, { "name": "DSA-2420", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2420" }, { "name": "oval:org.mitre.oval:def:13976", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13976" }, { "name": "RHSA-2012:0508", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "name": "SSRT100867", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49198" }, { "name": "RHSA-2012:0514", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0514.html" }, { "name": "RHSA-2012:1080", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1080.html" }, { "name": "HPSBUX02777", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "RHSA-2012:0702", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0702.html" }, { "name": "HPSBUX02760", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "SSRT100854", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "SSRT100779", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133364885411663\u0026w=2" }, { "name": "HPSBMU02797", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.2_35", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:*:update33:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:*:update30:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:jre:*:update2:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0505" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "name": "48589", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48589" }, { "name": "49198", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/49198" }, { "name": "SUSE-SU-2012:1013", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00015.html" }, { "name": "48692", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48692" }, { "name": "48948", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48948" }, { "name": "48950", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48950" }, { "name": "48915", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48915" }, { "name": "RHSA-2013:1455", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "name": "DSA-2420", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2012/dsa-2420" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "SSRT100867", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "HPSBUX02777", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "SSRT100805", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "name": "HPSBUX02757", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=133364885411663\u0026w=2" }, { "name": "HPSBUX02784", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=133847939902305\u0026w=2" }, { "name": "52017", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/52017" }, { "name": "oval:org.mitre.oval:def:13976", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13976" }, { "name": "RHSA-2012:1080", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1080.html" }, { "name": "HPSBMU02799", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "SUSE-SU-2012:0881", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00007.html" }, { "name": "RHSA-2012:0702", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0702.html" }, { "name": "RHSA-2012:0514", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0514.html" }, { "name": "RHSA-2012:0508", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "name": "SUSE-SU-2012:0734", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00009.html" }, { "name": "SUSE-SU-2012:0603", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" }, { "name": "SUSE-SU-2012:0602", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "name": "48073", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48073" }, { "name": "48074", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48074" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2022-05-13T14:52Z", "publishedDate": "2012-02-15T22:55Z" } } }
ghsa-265h-j3mg-7rf9
Vulnerability from github
Published
2022-05-04 00:30
Modified
2022-05-04 00:30
Details
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
{ "affected": [], "aliases": [ "CVE-2012-0505" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-02-15T22:55:00Z", "severity": "HIGH" }, "details": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.", "id": "GHSA-265h-j3mg-7rf9", "modified": "2022-05-04T00:30:55Z", "published": "2022-05-04T00:30:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0505" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13976" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00009.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00015.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133364885411663\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133365109612558\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133847939902305\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0514.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0702.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1080.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-1455.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/48073" }, { "type": "WEB", "url": "http://secunia.com/advisories/48074" }, { "type": "WEB", "url": "http://secunia.com/advisories/48589" }, { "type": "WEB", "url": "http://secunia.com/advisories/48692" }, { "type": "WEB", "url": "http://secunia.com/advisories/48915" }, { "type": "WEB", "url": "http://secunia.com/advisories/48948" }, { "type": "WEB", "url": "http://secunia.com/advisories/48950" }, { "type": "WEB", "url": "http://secunia.com/advisories/49198" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "type": "WEB", "url": "http://www.debian.org/security/2012/dsa-2420" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/52017" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.