Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-1724
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:08:37.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "53958", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53958" }, { "name": "RHSA-2012:0734", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "name": "[OpenJDK] 20120612 IcedTea6 1.10.8 \u0026 1.11.3 Released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html" }, { "name": "SSRT100919", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2" }, { "name": "oval:org.mitre.oval:def:16659", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16659" }, { "name": "MDVSA-2012:095", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "HPSBUX02805", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-17T19:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "53958", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53958" }, { "name": "RHSA-2012:0734", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "name": "[OpenJDK] 20120612 IcedTea6 1.10.8 \u0026 1.11.3 Released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html" }, { "name": "SSRT100919", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2" }, { "name": "oval:org.mitre.oval:def:16659", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16659" }, { "name": "MDVSA-2012:095", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "HPSBUX02805", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-1724", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "53958", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53958" }, { "name": "RHSA-2012:0734", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "name": "[OpenJDK] 20120612 IcedTea6 1.10.8 \u0026 1.11.3 Released", "refsource": "MLIST", "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html" }, { "name": "SSRT100919", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2" }, { "name": "oval:org.mitre.oval:def:16659", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16659" }, { "name": "MDVSA-2012:095", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "name": "MDVSA-2013:150", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "HPSBUX02805", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-1724", "datePublished": "2012-06-16T21:00:00", "dateReserved": "2012-03-16T00:00:00", "dateUpdated": "2024-08-06T19:08:37.558Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-1724\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2012-06-16T21:55:03.547\",\"lastModified\":\"2024-11-21T01:37:33.983\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad no especificada en el componente Java Runtime Enviroment (JRE) en Oracle Java SE v7 actualizaci\u00f3n 4 y anteriores, y v6 actualizaci\u00f3n 32 y anteriores, permite a atacantes remotos afectar la disponibilidad, relacionado con JAXP. \\r\\n\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:*:update4:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.7.0\",\"matchCriteriaId\":\"2D3162C7-575B-4AD4-B923-C97F5706349B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E44FC8AF-F76F-4A8E-8D03-4F8BCA8CB031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6152036D-6421-4AE4-9223-766FE07B5A44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D375CECB-405C-4E18-A7E8-9C5A2F97BD69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"52EEEA5A-E77C-43CF-A063-9D5C64EA1870\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:*:update4:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.7.0\",\"matchCriteriaId\":\"404F6D28-CCE9-4767-8734-544274B4D086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C27372B-A091-46D5-AE39-A44BBB1D9EE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4B153FD-E20B-4909-8B10-884E48F5B590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB106FA9-26CE-48C5-AEA5-FD1A5454AEE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5831D70B-3854-4CB8-B88D-40F1743DAEE0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:*:update32:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.6.0\",\"matchCriteriaId\":\"574A7ACD-243A-4136-AB02-B89EA97C884F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"301E96A3-AD2F-48F3-9166-571BD6F9FAE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C9215D9-DB64-4CEE-85E6-E247035EFB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"352509FE-54D9-4A59-98B7-96E5E98BC2CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3EC13D3-4CE7-459C-A7D7-7D38C1284720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CDCD1B4-C5F3-4188-B05F-23922F7DE517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*\",\"matchCriteriaId\":\"1824DA2D-26D5-4595-8376-8E41AB8C5E52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*\",\"matchCriteriaId\":\"B72F78B7-10D1-49CF-AC4D-3B10921CB633\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*\",\"matchCriteriaId\":\"60D05860-9424-4727-B583-74A35BC9BDFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*\",\"matchCriteriaId\":\"F85DB431-FEA4-42E7-AC29-6B66174DCD9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:*:update32:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.6.0\",\"matchCriteriaId\":\"179867A2-8221-4B8C-A04C-35FBA8EB07D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF13B96D-1F80-4672-8DA3-F86F6D3BF070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1A2D440-D966-41A6-955D-38B28DDE0FDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C57774-AD93-4162-8E45-92B09139C808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD7C4194-D34A-418F-9B00-5C6012844AAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF7D86B-1B4D-4E1F-9EF0-DA7E419D7E99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B82FB1-0F0E-44F9-87AE-628517279E4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A67640-2F4A-488A-9D8F-3FE1F4DA8DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D60D98D-4363-44A0-AAB4-B61BA623EE21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CDA4F0-C32B-4B08-A377-7D4426C2F569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A4FEC7-A4A0-4B5C-A56C-8F80AE19865E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"722A93D8-B5BC-42F3-92A2-E424F61269A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"775F2611-F11C-4B84-8F40-0D034B81BF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"F20FDD9F-FF45-48BC-9207-54FB02E76071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA326F5-894A-4B01-BCA3-B126DA81CA59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"228AB7B4-4BA4-43D4-B562-D438884DB152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD5C688-2103-4D60-979E-D9BE69A989C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"21421215-F722-4207-A2E5-E2DF4B29859B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB9EA23-0EF7-4582-A265-3F5AA9EC81B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"C367B418-659E-4627-B1F1-1B1216C99055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD5E6D4E-DDDD-4B45-B5E9-F8A916287AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*\",\"matchCriteriaId\":\"7358492A-491C-491E-AEDF-63CB82619BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_20:x64:*:*:*:*:*\",\"matchCriteriaId\":\"DAD3F9CB-55D5-4B7A-AF1A-D5D154D5D9EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3DACAAF-AFDC-4391-9E85-344F30937F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D98175BF-B084-4FA5-899D-9E80DC3923EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"820632CE-F8DF-47EE-B716-7530E60008B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA2BD0A3-7B2D-447B-ABAC-7B867B03B632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D54AB785-E9B7-47BD-B756-0C3A629D67DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9412098-0353-4F7B-9245-010557E6C651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD30DAEB-4893-41CF-A455-B69C463B9337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*\",\"matchCriteriaId\":\"21D6CE7E-A036-496C-8E08-A87F62B5290A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBCD143C-057D-4F42-B487-46801E14ACF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"09027C19-D442-446F-B7A8-21DB6787CF43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0FEC28-0707-4F42-9740-78F3D2D551EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3C5879A-A608-4230-9DC1-C27F0F48A13B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A3B254-8580-45DB-BDE4-5B5A29CBFFB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"AADBB4F9-E43E-428B-9979-F47A15696C85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"49260B94-05DE-4B78-9068-6F5F6BFDD19E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4FDE9EB-08FE-436E-A265-30E83B15DB23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7158D2C0-E9AC-4CD6-B777-EA7B7A181997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08C075B-9FC0-4381-A9E4-FFF0362BD308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*\",\"matchCriteriaId\":\"F587E635-3A15-4186-B6A1-F99BE0A56820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"90EC6C13-4B37-48E5-8199-A702A944D5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2528152C-E20A-4D97-931C-A5EC3CEAA06D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A99DAB4C-272B-4C91-BC70-7729E1152590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"30DFC10A-A4D9-4F89-B17C-AB9260087D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"272A5C44-18EC-41A9-8233-E9D4D0734EA6\"}]}]}],\"references\":[{\"url\":\"http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0734.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:095\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/53958\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16659\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0734.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:095\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/53958\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16659\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-j436-w8m4-m9w5
Vulnerability from github
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.
{ "affected": [], "aliases": [ "CVE-2012-1724" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-06-16T21:55:00Z", "severity": "MODERATE" }, "details": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.", "id": "GHSA-j436-w8m4-m9w5", "modified": "2022-05-14T00:03:15Z", "published": "2022-05-14T00:03:15Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1724" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16659" }, { "type": "WEB", "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/53958" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2012_1009
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.7.0-openjdk packages that fix several security issues and\none bug are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 7 Java Runtime Environment and the\nOpenJDK 7 Software Development Kit.\n\nMultiple flaws were discovered in the CORBA (Common Object Request Broker\nArchitecture) implementation in Java. A malicious Java application or\napplet could use these flaws to bypass Java sandbox restrictions or modify\nimmutable object data. (CVE-2012-1711, CVE-2012-1719)\n\nIt was discovered that the SynthLookAndFeel class from Swing did not\nproperly prevent access to certain UI elements from outside the current\napplication context. A malicious Java application or applet could use this\nflaw to crash the Java Virtual Machine, or bypass Java sandbox\nrestrictions. (CVE-2012-1716)\n\nMultiple flaws were discovered in the font manager\u0027s layout lookup\nimplementation. A specially-crafted font file could cause the Java Virtual\nMachine to crash or, possibly, execute arbitrary code with the privileges\nof the user running the virtual machine. (CVE-2012-1713)\n\nMultiple flaws were found in the way the Java HotSpot Virtual Machine\nverified the bytecode of the class file to be executed. A specially-crafted\nJava application or applet could use these flaws to crash the Java Virtual\nMachine, or bypass Java sandbox restrictions. (CVE-2012-1723,\nCVE-2012-1725)\n\nIt was discovered that java.lang.invoke.MethodHandles.Lookup did not\nproperly honor access modes. An untrusted Java application or applet could\nuse this flaw to bypass Java sandbox restrictions. (CVE-2012-1726)\n\nIt was discovered that the Java XML parser did not properly handle certain\nXML documents. An attacker able to make a Java application parse a\nspecially-crafted XML file could use this flaw to make the XML parser enter\nan infinite loop. (CVE-2012-1724)\n\nIt was discovered that the Java security classes did not properly handle\nCertificate Revocation Lists (CRL). CRL containing entries with duplicate\ncertificate serial numbers could have been ignored. (CVE-2012-1718)\n\nIt was discovered that various classes of the Java Runtime library could\ncreate temporary files with insecure permissions. A local attacker could\nuse this flaw to gain access to the content of such temporary files.\n(CVE-2012-1717)\n\nThis update also fixes the following bug:\n\n* Attempting to compile a SystemTap script using the jstack tapset could\nhave failed with an error similar to the following:\n\nerror: the frame size of 272 bytes is larger than 256 bytes\n\nThis update corrects the jstack tapset and resolves this issue. (BZ#833035)\n\nThis erratum also upgrades the OpenJDK package to IcedTea7 2.2.1. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.7.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1009", "url": "https://access.redhat.com/errata/RHSA-2012:1009" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://icedtea.classpath.org/hg/release/icedtea7-2.2/file/icedtea-2.2.1/NEWS", "url": "http://icedtea.classpath.org/hg/release/icedtea7-2.2/file/icedtea-2.2.1/NEWS" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "category": "external", "summary": "829354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354" }, { "category": "external", "summary": "829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "829373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373" }, { "category": "external", "summary": "829374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374" }, { "category": "external", "summary": "829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "829377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829377" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1009.json" } ], "title": "Red Hat Security Advisory: java-1.7.0-openjdk security and bug fix update", "tracking": { "current_release_date": "2024-11-14T12:12:44+00:00", "generator": { "date": "2024-11-14T12:12:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:1009", "initial_release_date": "2012-06-20T11:38:00+00:00", "revision_history": [ { "date": "2012-06-20T11:38:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-06-20T11:39:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T12:12:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "product": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "product_id": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.5-2.2.1.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "product": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "product_id": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.5-2.2.1.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "product": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "product_id": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.5-2.2.1.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "product": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "product_id": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.5-2.2.1.el6_3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "product": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.5-2.2.1.el6_3?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "product": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "product_id": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-javadoc@1.7.0.5-2.2.1.el6_3?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "product": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "product_id": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.5-2.2.1.el6_3?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "product": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "product_id": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1.7.0.5-2.2.1.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "product": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "product_id": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-debuginfo@1.7.0.5-2.2.1.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "product": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "product_id": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-demo@1.7.0.5-2.2.1.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "product": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "product_id": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-src@1.7.0.5-2.2.1.el6_3?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "product": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "product_id": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-openjdk-devel@1.7.0.5-2.2.1.el6_3?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Client-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Client-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Server-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Server-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch" }, "product_reference": "java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "relates_to_product_reference": "6Workstation-optional-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" }, "product_reference": "java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "relates_to_product_reference": "6Workstation-optional-6.3.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-1711", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829354" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper protection of CORBA data models (CORBA, 7079902)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1711" }, { "category": "external", "summary": "RHBZ#829354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1711", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1711" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1711", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1711" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: improper protection of CORBA data models (CORBA, 7079902)" }, { "cve": "CVE-2012-1713", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829361" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1713" }, { "category": "external", "summary": "RHBZ#829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)" }, { "cve": "CVE-2012-1716", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829360" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1716" }, { "category": "external", "summary": "RHBZ#829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)" }, { "cve": "CVE-2012-1717", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829358" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1717" }, { "category": "external", "summary": "RHBZ#829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)" }, { "cve": "CVE-2012-1718", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829372" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1718" }, { "category": "external", "summary": "RHBZ#829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)" }, { "cve": "CVE-2012-1719", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829371" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1719" }, { "category": "external", "summary": "RHBZ#829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)" }, { "cve": "CVE-2012-1723", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829373" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1723" }, { "category": "external", "summary": "RHBZ#829373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1723", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)" }, { "cve": "CVE-2012-1724", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829374" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: XML parsing infinite loop (JAXP, 7157609)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1724" }, { "category": "external", "summary": "RHBZ#829374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1724", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1724" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: XML parsing infinite loop (JAXP, 7157609)" }, { "cve": "CVE-2012-1725", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829376" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1725" }, { "category": "external", "summary": "RHBZ#829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)" }, { "cve": "CVE-2012-1726", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829377" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: java.lang.invoke.MethodHandles.Lookup does not honor access modes (Libraries, 7165628)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1726" }, { "category": "external", "summary": "RHBZ#829377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829377" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1726", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1726" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:38:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Client-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Client-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Client-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6ComputeNode-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Server-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Server-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Server-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.src", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-debuginfo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-demo-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-devel-1:1.7.0.5-2.2.1.el6_3.x86_64", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-javadoc-1:1.7.0.5-2.2.1.el6_3.noarch", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.i686", "6Workstation-optional-6.3.z:java-1.7.0-openjdk-src-1:1.7.0.5-2.2.1.el6_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: java.lang.invoke.MethodHandles.Lookup does not honor access modes (Libraries, 7165628)" } ] }
rhsa-2012_1019
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.7.0-oracle packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Oracle Java 7 release includes the Oracle Java 7 Runtime Environment\nand the Oracle Java 7 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Oracle Java 7 Runtime\nEnvironment and the Oracle Java 7 Software Development Kit. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch page, listed in the References section. (CVE-2012-0551,\nCVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718,\nCVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1723, CVE-2012-1724,\nCVE-2012-1725, CVE-2012-1726)\n\nAll users of java-1.7.0-oracle are advised to upgrade to these updated\npackages, which provide Oracle Java 7 Update 5 and resolve these issues.\nAll running instances of Oracle Java must be restarted for the update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1019", "url": "https://access.redhat.com/errata/RHSA-2012:1019" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "category": "external", "summary": "829354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354" }, { "category": "external", "summary": "829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "829373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373" }, { "category": "external", "summary": "829374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374" }, { "category": "external", "summary": "829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "829377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829377" }, { "category": "external", "summary": "831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1019.json" } ], "title": "Red Hat Security Advisory: java-1.7.0-oracle security update", "tracking": { "current_release_date": "2024-11-14T12:12:49+00:00", "generator": { "date": "2024-11-14T12:12:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:1019", "initial_release_date": "2012-06-20T11:35:00+00:00", "revision_history": [ { "date": "2012-06-20T11:35:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-06-20T11:39:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T12:12:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "product": { "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "product_id": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1.7.0.5-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "product": { "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "product_id": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-src@1.7.0.5-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "product": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "product_id": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-plugin@1.7.0.5-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "product": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "product_id": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-jdbc@1.7.0.5-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "product": { "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "product_id": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-devel@1.7.0.5-1jpp.1.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "product": { "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "product_id": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1.7.0.5-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "product": { "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "product_id": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-src@1.7.0.5-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "product": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "product_id": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-plugin@1.7.0.5-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "product": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "product_id": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-jdbc@1.7.0.5-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "product": { "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "product_id": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.7.0-oracle-devel@1.7.0.5-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" }, "product_reference": "java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.3.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-0551", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831355" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0551" }, { "category": "external", "summary": "RHBZ#831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0551", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1711", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829354" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper protection of CORBA data models (CORBA, 7079902)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1711" }, { "category": "external", "summary": "RHBZ#829354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1711", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1711" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1711", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1711" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: improper protection of CORBA data models (CORBA, 7079902)" }, { "cve": "CVE-2012-1713", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829361" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1713" }, { "category": "external", "summary": "RHBZ#829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)" }, { "cve": "CVE-2012-1716", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829360" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1716" }, { "category": "external", "summary": "RHBZ#829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)" }, { "cve": "CVE-2012-1717", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829358" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1717" }, { "category": "external", "summary": "RHBZ#829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)" }, { "cve": "CVE-2012-1718", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829372" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1718" }, { "category": "external", "summary": "RHBZ#829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)" }, { "cve": "CVE-2012-1719", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829371" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1719" }, { "category": "external", "summary": "RHBZ#829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)" }, { "cve": "CVE-2012-1721", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831353" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1721" }, { "category": "external", "summary": "RHBZ#831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1721", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1722", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831354" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1721.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1722" }, { "category": "external", "summary": "RHBZ#831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1722", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1722" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1723", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829373" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1723" }, { "category": "external", "summary": "RHBZ#829373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1723", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)" }, { "cve": "CVE-2012-1724", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829374" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: XML parsing infinite loop (JAXP, 7157609)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1724" }, { "category": "external", "summary": "RHBZ#829374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1724", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1724" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: XML parsing infinite loop (JAXP, 7157609)" }, { "cve": "CVE-2012-1725", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829376" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1725" }, { "category": "external", "summary": "RHBZ#829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)" }, { "cve": "CVE-2012-1726", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829377" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: java.lang.invoke.MethodHandles.Lookup does not honor access modes (Libraries, 7165628)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1726" }, { "category": "external", "summary": "RHBZ#829377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829377" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1726", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1726" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-20T11:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1019" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Client-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6ComputeNode-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Server-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-devel-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-jdbc-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-plugin-1:1.7.0.5-1jpp.1.el6.x86_64", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.i686", "6Workstation-Supplementary-6.3.z:java-1.7.0-oracle-src-1:1.7.0.5-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK: java.lang.invoke.MethodHandles.Lookup does not honor access modes (Libraries, 7165628)" } ] }
rhsa-2012_0734
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-sun packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch page, listed in the References section. (CVE-2012-0551,\nCVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718,\nCVE-2012-1719, CVE-2012-1721, CVE-2012-1722, CVE-2012-1723, CVE-2012-1724,\nCVE-2012-1725)\n\nAll users of java-1.6.0-sun are advised to upgrade to these updated\npackages, which provide JDK and JRE 6 Update 33 and resolve these issues.\nAll running instances of Sun Java must be restarted for the update to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0734", "url": "https://access.redhat.com/errata/RHSA-2012:0734" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "category": "external", "summary": "829354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354" }, { "category": "external", "summary": "829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "829373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373" }, { "category": "external", "summary": "829374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374" }, { "category": "external", "summary": "829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0734.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-sun security update", "tracking": { "current_release_date": "2024-11-14T12:12:39+00:00", "generator": { "date": "2024-11-14T12:12:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0734", "initial_release_date": "2012-06-13T20:00:00+00:00", "revision_history": [ { "date": "2012-06-13T20:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-11-14T19:08:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T12:12:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.33-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.33-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.33-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.33-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.33-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.33-1jpp.1.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.33-1jpp.1.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.33-1jpp.1.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.33-1jpp.1.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.33-1jpp.1.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.33-1jpp.1.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.33-1jpp.1.el5_8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.33-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.33-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.33-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.33-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.33-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.33-1jpp.1.el6_2?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.33-1jpp.1.el5_8?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.33-1jpp.1.el5_8?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.33-1jpp.1.el5_8?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "product_id": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.33-1jpp.1.el5_8?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.33-1jpp.1.el5_8?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.33-1jpp.1.el5_8?arch=i586\u0026epoch=1" } } } ], "category": "architecture", "name": "i586" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Client-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "relates_to_product_reference": "5Server-Supplementary-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.2.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-0551", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831355" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0551" }, { "category": "external", "summary": "RHBZ#831355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0551", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0551" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1711", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829354" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper protection of CORBA data models (CORBA, 7079902)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1711" }, { "category": "external", "summary": "RHBZ#829354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1711", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1711" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1711", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1711" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: improper protection of CORBA data models (CORBA, 7079902)" }, { "cve": "CVE-2012-1713", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829361" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1713" }, { "category": "external", "summary": "RHBZ#829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)" }, { "cve": "CVE-2012-1716", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829360" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1716" }, { "category": "external", "summary": "RHBZ#829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)" }, { "cve": "CVE-2012-1717", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829358" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1717" }, { "category": "external", "summary": "RHBZ#829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)" }, { "cve": "CVE-2012-1718", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829372" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1718" }, { "category": "external", "summary": "RHBZ#829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)" }, { "cve": "CVE-2012-1719", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829371" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1719" }, { "category": "external", "summary": "RHBZ#829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)" }, { "cve": "CVE-2012-1721", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831353" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1721" }, { "category": "external", "summary": "RHBZ#831353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1721", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1721" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1722", "discovery_date": "2012-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "831354" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1721.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1722" }, { "category": "external", "summary": "RHBZ#831354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1722", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1722" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1722" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)" }, { "cve": "CVE-2012-1723", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829373" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1723" }, { "category": "external", "summary": "RHBZ#829373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1723", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)" }, { "cve": "CVE-2012-1724", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829374" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: XML parsing infinite loop (JAXP, 7157609)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1724" }, { "category": "external", "summary": "RHBZ#829374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1724", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1724" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: XML parsing infinite loop (JAXP, 7157609)" }, { "cve": "CVE-2012-1725", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829376" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1725" }, { "category": "external", "summary": "RHBZ#829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T20:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0734" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Client-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el5_8.x86_64", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.i586", "5Server-Supplementary-5.8.Z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el5_8.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Client-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6ComputeNode-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Server-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-demo-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-devel-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-jdbc-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-plugin-1:1.6.0.33-1jpp.1.el6_2.x86_64", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.i686", "6Workstation-Supplementary-6.2.z:java-1.6.0-sun-src-1:1.6.0.33-1jpp.1.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)" } ] }
rhsa-2012_0729
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nMultiple flaws were discovered in the CORBA (Common Object Request Broker\nArchitecture) implementation in Java. A malicious Java application or\napplet could use these flaws to bypass Java sandbox restrictions or modify\nimmutable object data. (CVE-2012-1711, CVE-2012-1719)\n\nIt was discovered that the SynthLookAndFeel class from Swing did not\nproperly prevent access to certain UI elements from outside the current\napplication context. A malicious Java application or applet could use this\nflaw to crash the Java Virtual Machine, or bypass Java sandbox\nrestrictions. (CVE-2012-1716)\n\nMultiple flaws were discovered in the font manager\u0027s layout lookup\nimplementation. A specially-crafted font file could cause the Java Virtual\nMachine to crash or, possibly, execute arbitrary code with the privileges\nof the user running the virtual machine. (CVE-2012-1713)\n\nMultiple flaws were found in the way the Java HotSpot Virtual Machine\nverified the bytecode of the class file to be executed. A specially-crafted\nJava application or applet could use these flaws to crash the Java Virtual\nMachine, or bypass Java sandbox restrictions. (CVE-2012-1723,\nCVE-2012-1725)\n\nIt was discovered that the Java XML parser did not properly handle certain\nXML documents. An attacker able to make a Java application parse a\nspecially-crafted XML file could use this flaw to make the XML parser enter\nan infinite loop. (CVE-2012-1724)\n\nIt was discovered that the Java security classes did not properly handle\nCertificate Revocation Lists (CRL). CRL containing entries with duplicate\ncertificate serial numbers could have been ignored. (CVE-2012-1718)\n\nIt was discovered that various classes of the Java Runtime library could\ncreate temporary files with insecure permissions. A local attacker could\nuse this flaw to gain access to the content of such temporary files.\n(CVE-2012-1717)\n\nNote: If the web browser plug-in provided by the icedtea-web package was\ninstalled, the issues exposed via Java applets could have been exploited\nwithout user interaction if a user visited a malicious website.\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.11.3. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0729", "url": "https://access.redhat.com/errata/RHSA-2012:0729" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.3/NEWS", "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.3/NEWS" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "category": "external", "summary": "829354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354" }, { "category": "external", "summary": "829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "829373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373" }, { "category": "external", "summary": "829374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374" }, { "category": "external", "summary": "829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0729.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-openjdk security update", "tracking": { "current_release_date": "2024-11-14T12:12:29+00:00", "generator": { "date": "2024-11-14T12:12:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0729", "initial_release_date": "2012-06-13T13:04:00+00:00", "revision_history": [ { "date": "2012-06-13T13:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-06-13T13:09:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T12:12:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.48.1.11.3.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.48.1.11.3.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.48.1.11.3.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.48.1.11.3.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.48.1.11.3.el6_2?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.48.1.11.3.el6_2?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.48.1.11.3.el6_2?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.48.1.11.3.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.48.1.11.3.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.48.1.11.3.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.48.1.11.3.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.48.1.11.3.el6_2?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.48.1.11.3.el6_2?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Server-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "relates_to_product_reference": "6Workstation-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "relates_to_product_reference": "6Workstation-optional-6.2.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-1711", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829354" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper protection of CORBA data models (CORBA, 7079902)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1711" }, { "category": "external", "summary": "RHBZ#829354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1711", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1711" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1711", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1711" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0729" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: improper protection of CORBA data models (CORBA, 7079902)" }, { "cve": "CVE-2012-1713", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829361" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1713" }, { "category": "external", "summary": "RHBZ#829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0729" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)" }, { "cve": "CVE-2012-1716", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829360" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1716" }, { "category": "external", "summary": "RHBZ#829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0729" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)" }, { "cve": "CVE-2012-1717", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829358" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1717" }, { "category": "external", "summary": "RHBZ#829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0729" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)" }, { "cve": "CVE-2012-1718", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829372" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1718" }, { "category": "external", "summary": "RHBZ#829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0729" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)" }, { "cve": "CVE-2012-1719", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829371" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1719" }, { "category": "external", "summary": "RHBZ#829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0729" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)" }, { "cve": "CVE-2012-1723", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829373" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1723" }, { "category": "external", "summary": "RHBZ#829373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1723", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0729" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)" }, { "cve": "CVE-2012-1724", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829374" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: XML parsing infinite loop (JAXP, 7157609)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1724" }, { "category": "external", "summary": "RHBZ#829374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1724", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1724" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0729" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: XML parsing infinite loop (JAXP, 7157609)" }, { "cve": "CVE-2012-1725", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829376" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1725" }, { "category": "external", "summary": "RHBZ#829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:04:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0729" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Client-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Client-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6ComputeNode-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Server-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Server-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.src", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.i686", "6Workstation-optional-6.2.z:java-1.6.0-openjdk-src-1:1.6.0.0-1.48.1.11.3.el6_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)" } ] }
rhsa-2012_0730
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-openjdk packages that fix several security issues are\nnow available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nMultiple flaws were discovered in the CORBA (Common Object Request Broker\nArchitecture) implementation in Java. A malicious Java application or\napplet could use these flaws to bypass Java sandbox restrictions or modify\nimmutable object data. (CVE-2012-1711, CVE-2012-1719)\n\nIt was discovered that the SynthLookAndFeel class from Swing did not\nproperly prevent access to certain UI elements from outside the current\napplication context. A malicious Java application or applet could use this\nflaw to crash the Java Virtual Machine, or bypass Java sandbox\nrestrictions. (CVE-2012-1716)\n\nMultiple flaws were discovered in the font manager\u0027s layout lookup\nimplementation. A specially-crafted font file could cause the Java Virtual\nMachine to crash or, possibly, execute arbitrary code with the privileges\nof the user running the virtual machine. (CVE-2012-1713)\n\nMultiple flaws were found in the way the Java HotSpot Virtual Machine\nverified the bytecode of the class file to be executed. A specially-crafted\nJava application or applet could use these flaws to crash the Java Virtual\nMachine, or bypass Java sandbox restrictions. (CVE-2012-1723,\nCVE-2012-1725)\n\nIt was discovered that the Java XML parser did not properly handle certain\nXML documents. An attacker able to make a Java application parse a\nspecially-crafted XML file could use this flaw to make the XML parser enter\nan infinite loop. (CVE-2012-1724)\n\nIt was discovered that the Java security classes did not properly handle\nCertificate Revocation Lists (CRL). CRL containing entries with duplicate\ncertificate serial numbers could have been ignored. (CVE-2012-1718)\n\nIt was discovered that various classes of the Java Runtime library could\ncreate temporary files with insecure permissions. A local attacker could\nuse this flaw to gain access to the content of such temporary files.\n(CVE-2012-1717)\n\nThis erratum also upgrades the OpenJDK package to IcedTea6 1.10.8. Refer to\nthe NEWS file, linked to in the References, for further information.\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0730", "url": "https://access.redhat.com/errata/RHSA-2012:0730" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://icedtea.classpath.org/hg/release/icedtea6-1.10/file/icedtea6-1.10.8/NEWS", "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.10/file/icedtea6-1.10.8/NEWS" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "category": "external", "summary": "829354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354" }, { "category": "external", "summary": "829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "829373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373" }, { "category": "external", "summary": "829374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374" }, { "category": "external", "summary": "829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0730.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-openjdk security update", "tracking": { "current_release_date": "2024-11-14T12:12:34+00:00", "generator": { "date": "2024-11-14T12:12:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0730", "initial_release_date": "2012-06-13T13:06:00+00:00", "revision_history": [ { "date": "2012-06-13T13:06:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-06-13T13:09:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T12:12:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.27.1.10.8.el5_8?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.27.1.10.8.el5_8?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.27.1.10.8.el5_8?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.27.1.10.8.el5_8?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.27.1.10.8.el5_8?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.27.1.10.8.el5_8?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.27.1.10.8.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.27.1.10.8.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.27.1.10.8.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.27.1.10.8.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.27.1.10.8.el5_8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.27.1.10.8.el5_8?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.27.1.10.8.el5_8?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "relates_to_product_reference": "5Server-5.8.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-1711", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829354" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: improper protection of CORBA data models (CORBA, 7079902)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1711" }, { "category": "external", "summary": "RHBZ#829354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1711", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1711" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1711", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1711" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0730" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: improper protection of CORBA data models (CORBA, 7079902)" }, { "cve": "CVE-2012-1713", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829361" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1713" }, { "category": "external", "summary": "RHBZ#829361", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1713", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1713" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1713" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0730" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)" }, { "cve": "CVE-2012-1716", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829360" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1716" }, { "category": "external", "summary": "RHBZ#829360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1716", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1716" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0730" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)" }, { "cve": "CVE-2012-1717", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829358" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insecure temporary file permissions (JRE, 7143606)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1717" }, { "category": "external", "summary": "RHBZ#829358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1717", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1717" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0730" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: insecure temporary file permissions (JRE, 7143606)" }, { "cve": "CVE-2012-1718", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829372" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1718" }, { "category": "external", "summary": "RHBZ#829372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1718", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1718" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0730" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)" }, { "cve": "CVE-2012-1719", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829371" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1719" }, { "category": "external", "summary": "RHBZ#829371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1719", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1719" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0730" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)" }, { "cve": "CVE-2012-1723", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829373" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1723" }, { "category": "external", "summary": "RHBZ#829373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1723", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1723" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0730" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)" }, { "cve": "CVE-2012-1724", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829374" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: XML parsing infinite loop (JAXP, 7157609)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1724" }, { "category": "external", "summary": "RHBZ#829374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1724", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1724" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0730" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: XML parsing infinite loop (JAXP, 7157609)" }, { "cve": "CVE-2012-1725", "discovery_date": "2012-06-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "829376" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1725" }, { "category": "external", "summary": "RHBZ#829376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1725", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1725" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-13T13:06:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0730" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Client-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Client-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.src", "5Server-5.8.Z:java-1.6.0-openjdk-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.i386", "5Server-5.8.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.27.1.10.8.el5_8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)" } ] }
gsd-2012-1724
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2012-1724", "description": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.", "id": "GSD-2012-1724", "references": [ "https://www.suse.com/security/cve/CVE-2012-1724.html", "https://www.debian.org/security/2012/dsa-2507", "https://access.redhat.com/errata/RHSA-2012:1019", "https://access.redhat.com/errata/RHSA-2012:1009", "https://access.redhat.com/errata/RHSA-2012:0734", "https://access.redhat.com/errata/RHSA-2012:0730", "https://access.redhat.com/errata/RHSA-2012:0729", "https://alas.aws.amazon.com/cve/html/CVE-2012-1724.html", "https://linux.oracle.com/cve/CVE-2012-1724.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2012-1724" ], "details": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.", "id": "GSD-2012-1724", "modified": "2023-12-13T01:20:17.959801Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-1724", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "53958", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53958" }, { "name": "RHSA-2012:0734", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "name": "[OpenJDK] 20120612 IcedTea6 1.10.8 \u0026 1.11.3 Released", "refsource": "MLIST", "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html" }, { "name": "SSRT100919", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2" }, { "name": "oval:org.mitre.oval:def:16659", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16659" }, { "name": "MDVSA-2012:095", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "name": "MDVSA-2013:150", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "HPSBUX02805", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "(,2.3.0]", "affected_versions": "All versions up to 2.3.0", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2018-01-17", "description": "Xerces allows remote attackers to affect availability.", "fixed_versions": [ "2.4.0" ], "identifier": "CVE-2012-1724", "identifiers": [ "CVE-2012-1724" ], "not_impacted": "All versions after 2.3.0", "package_slug": "maven/xerces/xercesImpl", "pubdate": "2012-06-16", "solution": "Upgrade to version 2.4.0 or above.", "title": "Excessive Iteration", "urls": [ "https://bugzilla.redhat.com/CVE-2012-1724", "http://svn.apache.org/viewvc?view=revision\u0026revision=319059" ], "uuid": "de04577c-f13e-49dc-8491-b309af59b6e5" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:jre:*:update4:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:*:update4:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_20:x64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:*:update32:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:*:update32:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-1724" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "name": "SSRT100919", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2" }, { "name": "53958", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/53958" }, { "name": "[OpenJDK] 20120612 IcedTea6 1.10.8 \u0026 1.11.3 Released", "refsource": "MLIST", "tags": [], "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html" }, { "name": "MDVSA-2012:095", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095" }, { "name": "MDVSA-2013:150", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "oval:org.mitre.oval:def:16659", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16659" }, { "name": "RHSA-2012:0734", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2022-05-13T14:52Z", "publishedDate": "2012-06-16T21:55Z" } } }
var-201206-0060
Vulnerability from variot
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP. The vulnerability can be exploited over multiple protocols. This issue affects the 'JAXP' sub-component. This vulnerability affects the following supported versions: 7 Update 4, 6 Update 32. Further information about these flaws can be found on the Oracle Java SE Critical Patch page, listed in the References section. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2012-06-12-1 Java for OS X 2012-004 and Java for Mac OS X 10.6 Update 9
Java for OS X 2012-004 and Java for Mac OS X 10.6 Update 9 is now available and addresses the following:
Java Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: Multiple vulnerabilities in Java Description: Multiple vulnerabilities exist in Java, the most serious of which may allow an untrusted Java applet to execute arbitrary code outside the Java sandbox. These issues are addressed by updating to Java version 1.6.0_33. Further information is available via the Java website at http://www.o racle.com/technetwork/java/javase/releasenotes-136954.html CVE-ID CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1718 CVE-2012-1719 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725
Java Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: The Java browser plugin and Java Web Start are deactivated if they remain unused for 35 days Description: As a security hardening measure, the Java browser plugin and Java Web Start are deactivated if they are unused for 35 days. Users may re-enable Java if they encounter Java applets on a web page or Java Web Start applications by clicking the region labeled "Inactive plug-in" on a web page. This security measure is also available for OS Lion systems if the prior update "Java for OS X 2012-003" was not installed.
Java Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.4, OS X Lion Server v10.7.4 Impact: The Java browser plugin and Java Web Start are deactivated if they do not meet the criteria for minimum safe version Description: As a security hardening measure, the Java browser plugin and Java Web Start are deactivated if they do not meet the criteria for minimum safe version. The minimum safe version of Java is updated daily, as needed.
Note: These updates include the security content from Java for OS X 2012-003 and Java for Mac OS X 10.6 Update 8.
Java for OS X 2012-004 and Java for Mac OS X 10.6 Update 9 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
For Mac OS X v10.6 systems The download file is named: JavaForMacOSX10.6.dmg Its SHA-1 digest is: c2fcc844b7073d8243588f3407eb3ce1d497043d
For OS X Lion systems The download file is named: JavaForOSX.dmg Its SHA-1 digest is: f176546327bc62d8cd397d54d1dc22b72aee1d2b
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org
iQIcBAEBAgAGBQJP15giAAoJEPefwLHPlZEw0JUQAI8bP4nvp9BgEyc8K2Z1GrKW sH0nTQtVCei8yF/ORZh7bnxTgANx/kbcwyy/+rfRuU0cKCryvIH5I6Odjt4qE17q Kqa/L8Xsl3pBdEwRVbo2rvy5IAVB32L8fUMfcQ4mweYeimTilR/+O9qQnFChZiEU KZgLCGDmBbGqhP/P/g9CM9G+g2rC+nG/07U8MN9nk0Mfio2mHxMSxFy96b4DK3TX g5R6nYOth+GEQPCC0+O7zKoVViL/6xLxvrnuGQL9uYizDgYLpfIHAyDUTJy27yVb t6ggjZIfMMKEL2uQAKh/1WlLN7oMfyYyIJkdKmjb9ZYRIia3brlmlDsEzoIH7DSr fdOJ/zUDHn6qvrRktdNhNJWI6z6XY6EzDWe+HnCbZvifqK7oiAtRJo7BcFeMFQS8 wDFLGebzr2YRFV+5Oa3hxDmGzXvl2B0FQ/T2PSOUraUuj14LSA1H/ekD7MrSo+09 tNDK2C3VpVY5eK7gjxFX8+hWT1w/x3jyIPWA7fCOzG6BM27FnQBuroFTTLlEmsev yV1Mcnd+KBgS194yu29gzbApOAQBHLT5epps1n/omIfQoKAfjfN66KM+dgl9e7uB 6s3s4sRCzQX8XtYlnC0PRG050R2lkO16k9UddZ/0CqE4pegIiIcvWtt4MB3jxMxr lTEVodir4Ubn3QZQ0SK7 =J235 -----END PGP SIGNATURE----- .
CVE-2012-1711 CVE-2012-1719
Multiple errors in the CORBA implementation could lead to breakouts of the Java sandbox
CVE-2012-1713
Missing input sanitising in the font manager could lead to the execution of arbitrary code.
CVE-2012-1716
The SynthLookAndFeel Swing class could be abused to break out of the Java sandbox.
CVE-2012-1723 CVE-2012-1725
Validation errors in the bytecode verifier of the Hotspot VM could lead to breakouts of the Java sandbox. * S7143872, CVE-2012-1718: Improve certificate extension processing * S7143851, CVE-2012-1719: Improve IIOP stub and tie generation in RMIC * S7152811, CVE-2012-1723: Issues in client compiler * S7157609, CVE-2012-1724: Issues with loop * S7160757, CVE-2012-1725: Problem with hotspot/runtime_classfile * S7110720: Issue with vm config file loadingIssue with vm config file loading * S7145239: Finetune package definition restriction * S7160677: missing else in fix for 7152811
The updated packages provides icedtea6-1.11.3 which is not vulnerable to these issues. The verification of md5 checksums and GPG signatures is performed automatically for you. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Important: java-1.7.0-openjdk security and bug fix update Advisory ID: RHSA-2012:1009-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-1009.html Issue date: 2012-06-20 CVE Names: CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 =====================================================================
- Summary:
Updated java-1.7.0-openjdk packages that fix several security issues and one bug are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64
- Description:
These packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Software Development Kit.
Multiple flaws were discovered in the CORBA (Common Object Request Broker Architecture) implementation in Java. A malicious Java application or applet could use these flaws to bypass Java sandbox restrictions or modify immutable object data. (CVE-2012-1711, CVE-2012-1719)
It was discovered that the SynthLookAndFeel class from Swing did not properly prevent access to certain UI elements from outside the current application context. A malicious Java application or applet could use this flaw to crash the Java Virtual Machine, or bypass Java sandbox restrictions. (CVE-2012-1716)
Multiple flaws were discovered in the font manager's layout lookup implementation. A specially-crafted font file could cause the Java Virtual Machine to crash or, possibly, execute arbitrary code with the privileges of the user running the virtual machine. (CVE-2012-1713)
Multiple flaws were found in the way the Java HotSpot Virtual Machine verified the bytecode of the class file to be executed. A specially-crafted Java application or applet could use these flaws to crash the Java Virtual Machine, or bypass Java sandbox restrictions. (CVE-2012-1723, CVE-2012-1725)
It was discovered that java.lang.invoke.MethodHandles.Lookup did not properly honor access modes. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2012-1726)
It was discovered that the Java XML parser did not properly handle certain XML documents. An attacker able to make a Java application parse a specially-crafted XML file could use this flaw to make the XML parser enter an infinite loop. (CVE-2012-1724)
It was discovered that the Java security classes did not properly handle Certificate Revocation Lists (CRL). CRL containing entries with duplicate certificate serial numbers could have been ignored. (CVE-2012-1718)
It was discovered that various classes of the Java Runtime library could create temporary files with insecure permissions. A local attacker could use this flaw to gain access to the content of such temporary files. (CVE-2012-1717)
This update also fixes the following bug:
- Attempting to compile a SystemTap script using the jstack tapset could have failed with an error similar to the following:
error: the frame size of 272 bytes is larger than 256 bytes
This update corrects the jstack tapset and resolves this issue. (BZ#833035)
This erratum also upgrades the OpenJDK package to IcedTea7 2.2.1. Refer to the NEWS file, linked to in the References, for further information.
All users of java-1.7.0-openjdk are advised to upgrade to these updated packages, which resolve these issues. All running instances of OpenJDK Java must be restarted for the update to take effect.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258
- Bugs fixed (http://bugzilla.redhat.com/):
829354 - CVE-2012-1711 OpenJDK: improper protection of CORBA data models (CORBA, 7079902)
829358 - CVE-2012-1717 OpenJDK: insecure temporary file permissions (JRE, 7143606)
829360 - CVE-2012-1716 OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)
829361 - CVE-2012-1713 OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)
829371 - CVE-2012-1719 OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)
829372 - CVE-2012-1718 OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)
829373 - CVE-2012-1723 OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)
829374 - CVE-2012-1724 OpenJDK: XML parsing infinite loop (JAXP, 7157609)
829376 - CVE-2012-1725 OpenJDK: insufficient invokespecial
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm
i386: java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm
x86_64: java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm
i386: java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.i686.rpm
noarch: java-1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3.noarch.rpm
x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm
noarch: java-1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3.noarch.rpm
x86_64: java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm
i386: java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm
x86_64: java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm
i386: java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.i686.rpm
noarch: java-1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3.noarch.rpm
x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm
i386: java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm
x86_64: java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm
i386: java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.i686.rpm java-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.i686.rpm
noarch: java-1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3.noarch.rpm
x86_64: java-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2012-1711.html https://www.redhat.com/security/data/cve/CVE-2012-1713.html https://www.redhat.com/security/data/cve/CVE-2012-1716.html https://www.redhat.com/security/data/cve/CVE-2012-1717.html https://www.redhat.com/security/data/cve/CVE-2012-1718.html https://www.redhat.com/security/data/cve/CVE-2012-1719.html https://www.redhat.com/security/data/cve/CVE-2012-1723.html https://www.redhat.com/security/data/cve/CVE-2012-1724.html https://www.redhat.com/security/data/cve/CVE-2012-1725.html https://www.redhat.com/security/data/cve/CVE-2012-1726.html https://access.redhat.com/security/updates/classification/#important http://icedtea.classpath.org/hg/release/icedtea7-2.2/file/icedtea-2.2.1/NEWS http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFP4bdMXlSAg2UNWIIRAgLZAJ4rVT0qeWA3N7RGN/RRjkpcTqtF4wCeNbiZ 7KUEsZqVLjXnfpCmLH3lpCM= =GGr3 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03441075
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03441075 Version: 3
HPSBUX02805 SSRT100919 rev.3 - HP-UX Running Java, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2012-08-13 Last Updated: 2012-08-28
Potential Security Impact: Remote unauthorized access, disclosure of information, and other vulnerabilities
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. HP-UX B.11.11, B.11.23, and B.11.31 running HP JDK and JRE v7.0.01, v6.0.14 and v5.0.25 and earlier
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2012-0551 (AV:N/AC:M/Au:N/C:P/I:P/A:N) 5.8 CVE-2012-1711 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2012-1713 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-1716 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-1717 (AV:L/AC:L/Au:N/C:P/I:N/A:N) 2.1 CVE-2012-1718 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-1719 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0 CVE-2012-1720 (AV:L/AC:H/Au:N/C:P/I:P/A:P) 3.7 CVE-2012-1721 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-1722 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-1723 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-1724 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0 CVE-2012-1725 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-1726 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
NOTE: The following apply to v7.0.01 and earlier: CVE-2012-0551, CVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1720, CVE-2012-1721, CVE-2012-1722, CVE-2012-1723, CVE-2012-1724, CVE-2012-1725, CVE-2012-1726
NOTE: The following apply to v6.0.14 and earlier: CVE-2012-0551, CVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1720, CVE-2012-1721, CVE-2012-1722, CVE-2012-1723, CVE-2012-1724, CVE-2012-1725
NOTE: The following apply to v5.0.25 and earlier: CVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719, CVE-2012-1720, CVE-2012-1723, CVE-2012-1725
RESOLUTION
HP has provided the following Java version upgrade to resolve these vulnerabilities. The upgrade is available from the following location
http://www.hp.com/go/java
HP-UX B.11.23, B.11.31 JDK and JRE v7.0.02 or subsequent
HP-UX B.11.11, B.11.23, B.11.31 JDK and JRE v6.0.15 or subsequent
HP-UX B.11.11, B.11.23, B.11.31 JDK and JRE v5.0.26 or subsequent
MANUAL ACTIONS: Yes - Update For Java v7.0 update to Java v7.0.02 or subsequent For Java v6.0 update to Java v6.0.15 or subsequent For Java v5.0 update to Java v5.0.26 or subsequent
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS
HP-UX B.11.23 HP-UX B.11.31 =========== Jdk70.JDK70-COM Jdk70.JDK70-DEMO Jdk70.JDK70-IPF32 Jdk70.JDK70-IPF64 Jre70.JRE70-COM Jre70.JRE70-IPF32 Jre70.JRE70-IPF32-HS Jre70.JRE70-IPF64 Jre70.JRE70-IPF64-HS action: install revision 1.7.0.02.00 or subsequent
HP-UX B.11.23 HP-UX B.11.31 =========== Jdk60.JDK60-COM Jdk60.JDK60-DEMO Jdk60.JDK60-IPF32 Jdk60.JDK60-IPF64 Jre60.JRE60-COM Jre60.JRE60-IPF32 Jre60.JRE60-IPF32-HS Jre60.JRE60-IPF64 Jre60.JRE60-IPF64-HS action: install revision 1.6.0.15.00 or subsequent
HP-UX B.11.23 HP-UX B.11.31 =========== Jdk15.JDK15-COM Jdk15.JDK15-DEMO Jdk15.JDK15-IPF32 Jdk15.JDK15-IPF64 Jre15.JRE15-COM Jre15.JRE15-COM-DOC Jre15.JRE15-IPF32 Jre15.JRE15-IPF32-HS Jre15.JRE15-IPF64 Jre15.JRE15-IPF64-HS action: install revision 1.5.0.26.00 or subsequent
HP-UX B.11.11 HP-UX B.11.23 =========== Jdk60.JDK60-COM Jdk60.JDK60-DEMO Jdk60.JDK60-PA20 Jdk60.JDK60-PA20W Jre60.JRE60-COM Jre60.JRE60-COM-DOC Jre60.JRE60-PA20 Jre60.JRE60-PA20-HS Jre60.JRE60-PA20W Jre60.JRE60-PA20W-HS action: install revision 1.6.0.15.00 or subsequent
HP-UX B.11.11 HP-UX B.11.23 =========== Jdk15.JDK15-COM Jdk15.JDK15-DEMO Jdk15.JDK15-PA20 Jdk15.JDK15-PA20W Jre15.JRE15-COM Jre15.JRE15-COM-DOC Jre15.JRE15-PA20 Jre15.JRE15-PA20-HS Jre15.JRE15-PA20W Jre15.JRE15-PA20W-HS action: install revision 1.5.0.26.00 or subsequent
END AFFECTED VERSIONS
HISTORY Version:1 (rev.1) - 13 August 2012 Initial release Version:2 (rev.2) - 27 August 2012 Added v5.0.26 information Version:3 (rev.3) - 28 August 2012 Corrected CVE applicability
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: uCosminexus Products Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA49578
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49578/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49578
RELEASE DATE: 2012-06-15
DISCUSS ADVISORY: http://secunia.com/advisories/49578/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/49578/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=49578
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Hitachi has acknowledged multiple vulnerabilities in uCosminexus products, which can be exploited by malicious, local users to disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service) and by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
The vulnerabilities are caused due to vulnerabilities in the bundled version of Cosminexus Developer's Kit for Java.
For more information: SA49472
Please see the vendor's advisory for a list of affected products.
ORIGINAL ADVISORY: HS12-015: http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-015/index.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. Content-Disposition: inline
==========================================================================Ubuntu Security Notice USN-1505-2 August 30, 2012
icedtea-web regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
- Ubuntu 11.04
Summary:
USN 1505-1 introduced a regression in the IcedTea-Web Java web browser plugin that prevented it from working with the Chromium web browser.
Software Description: - icedtea-web: A web browser plugin to execute Java applets
Details:
USN-1505-1 fixed vulnerabilities in OpenJDK 6. As part of the update, IcedTea-Web packages were upgraded to a new version. That upgrade introduced a regression which prevented the IcedTea-Web plugin from working with the Chromium web browser in Ubuntu 11.04 and Ubuntu 11.10.
We apologize for the inconvenience. (CVE-2012-1724)
As part of this update, the IcedTea web browser applet plugin was updated for Ubuntu 10.04 LTS, Ubuntu 11.04, and Ubuntu 11.10.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 11.10: icedtea-6-plugin 1.2-2ubuntu0.11.10.3
Ubuntu 11.04: icedtea-6-plugin 1.2-2ubuntu0.11.04.3
After a standard system update you need to restart your web browser to make all the necessary changes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201206-0060", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ucosminexus developer standard", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "08-00-01" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "08-00-01" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-00" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.7.0" }, { "model": "jre", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "1.7.0" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.7.0" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.6.0" }, { "model": "jdk", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "1.6.0" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.6.0" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.6.0" }, { "model": "jre", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "1.6.0" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "1.6.0" }, { "model": "jdk", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "1.7.0" }, { "model": "jre 1.6.0 03", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 17", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.6.0 30", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 22", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.6.0 28", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.6.0 21", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 32", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 25", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.6.0 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 27", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 03", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 17", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.7.0 2", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.7.0 2", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 14", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.6.0 25", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 27", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 15", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 30", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.7" }, { "model": "jre 1.6.0 02", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.6.0 23", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 01", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.7.0 4", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.6.0 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-00-06" }, { "model": "jre 1.6.0 15", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "ucosminexus application server express", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "08-00" }, { "model": "jre 1.6.0 28", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 23", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 11", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 1.6.0 32", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 02", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.7.0 4", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 26", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 26", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 1.6.0 21", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 24", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.7" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-00-03" }, { "model": "jdk 1.6.0 22", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 1.6.0 24", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-06" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-10" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-03" }, { "model": "ucosminexus service platform )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-50" }, { "model": "jdk 01-b06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.6" }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-70" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00-02" }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-50" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-70" }, { "model": "ucosminexus application server express", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-09" }, { "model": "jre 1.6.0 2", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 01", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-53" }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-50" }, { "model": "jre 1.6.0 20", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-03" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-10" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00-02" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-60" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-06" }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "trio tview software", "scope": "eq", "trust": 0.3, "vendor": "schneider electric", "version": "3.27.0" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-05" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-02" }, { "model": "nonstop server h06.16.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.19.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "ucosminexus developer standard 06-71-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00-01" }, { "model": "nonstop server j06.08.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.15.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer standard 06-71-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer professional 06-70-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "reflection suite for", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x2011" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "trio tview software", "scope": "ne", "trust": 0.3, "vendor": "schneider electric", "version": "3.29.0" }, { "model": "nonstop server j06.06.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "ucosminexus application server express )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-50" }, { "model": "nonstop server j06.14", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "ucosminexus application server express", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-70" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "nonstop server j06.09.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.26", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer professional 06-70-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "nonstop server j06.04.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "nonstop server j06.13", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer professional 06-71-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00-01" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "ucosminexus developer light 06-71-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "nonstop server j06.09.04", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "security appscan source", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.1" }, { "model": "nonstop server h06.18.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.15.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.22.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "nonstop server j06.12.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.5" }, { "model": "nonstop server j06.05.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "nonstop server j06.08.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.09.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer standard 06-71-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "nonstop server j06.16", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus client for plug-in", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "nonstop server j6.0.14.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-70" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "freeflow print server 73.c0.41", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "enterprise linux desktop supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "010" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-02" }, { "model": "enterprise linux supplementary server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "ucosminexus service platform messaging", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-0" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00-02" }, { "model": "nonstop server j06.07.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "nonstop server j06.09.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-71" }, { "model": "security appscan source", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "8.6.0.2" }, { "model": "nonstop server j06.10.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-01" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "ucosminexus application server express )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "nonstop server j06.06.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "ucosminexus developer standard 06-71-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-53" }, { "model": "nonstop server h06.24.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.4" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-10" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-06" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-05" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.7" }, { "model": "nonstop server h06.25", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus application server light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "nonstop server h06.15.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "freeflow print server 73.b3.61", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-60" }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-20" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "ucosminexus developer light 06-70-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20" }, { "model": "nonstop server j06.07.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-06" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-01" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-02" }, { "model": "nonstop server j06.08.04", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.08.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "reflection for secure it unix server", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "0" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-01" }, { "model": "nonstop server h06.15.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.24", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer standard 06-71-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "12.1" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "nonstop server h06.16.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer professional for plug-in", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "nonstop server h06.18.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.20.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20" }, { "model": "enterprise linux server supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "nonstop server j06.13.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "nonstop server h06.19.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-53" }, { "model": "nonstop server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6" }, { "model": "ucosminexus developer light 06-70-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "reflection for secure it windows server", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "0" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-09" }, { "model": "enterprise linux workstation supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "nonstop server h06.22.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-02" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "ucosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-70" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-03" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "nonstop server h06.19.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x2011" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-10" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "ucosminexus developer light 06-70-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "nonstop server j06.11.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "nonstop server j06.15", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "ucosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-71" }, { "model": "reflection for secure it unix client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "0" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-60" }, { "model": "nonstop server h06.21.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus application server express", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-70" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "nonstop server h06.20.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00-01" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-02" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "nonstop server j06.05.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-50" }, { "model": "nonstop server j06.07.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer light 06-70-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server express (solaris(sparc", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "nonstop server h06.21.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.19.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura conferencing standard", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00-02" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-09" }, { "model": "ucosminexus developer standard 06-70-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "ucosminexus application server smart edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "nonstop server j06.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.26.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "nonstop server j06.04.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura conferencing sp1 standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "nonstop server j06.04.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.06.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus primary server base", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "nonstop server h06.21.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer professional 06-71-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-03" }, { "model": "ucosminexus developer light 06-71-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-01" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "nonstop server j06.06.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.17.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux enterprise desktop sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-53" }, { "model": "ucosminexus developer professional 06-71-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk 1.6.0 01-b06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ucosminexus developer professional 06-71-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-70" }, { "model": "nonstop server h06.20.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50" }, { "model": "nonstop server j06.10.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "nonstop server h06.17.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus application server express )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "enterprise linux hpc node supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop supplementary client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "ucosminexus application server standard-r", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "ucosminexus developer standard 06-70-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "nonstop server h06.16.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer professional 06-70-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "nonstop server j06.05.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-53" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "nonstop server h06.20.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-71" }, { "model": "linux enterprise desktop sp2", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "ucosminexus developer light 06-71-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "nonstop server j06.09.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "nonstop server h06.17.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.08.03", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ucosminexus developer professional 06-71-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "nonstop server j06.10.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-10" }, { "model": "nonstop server h06.25.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.18.01", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.27", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server h06.17.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "nonstop server j06.14.02", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-10" }, { "model": "ucosminexus developer standard 06-70-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null } ], "sources": [ { "db": "BID", "id": "53958" }, { "db": "NVD", "id": "CVE-2012-1724" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:jre:*:update4:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:*:update4:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.7.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_20:x64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:*:update32:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:*:update32:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1724" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "113609" }, { "db": "PACKETSTORM", "id": "113945" }, { "db": "PACKETSTORM", "id": "113605" }, { "db": "PACKETSTORM", "id": "113943" } ], "trust": 0.4 }, "cve": "CVE-2012-1724", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2012-1724", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1724", "trust": 1.0, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2012-1724", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2012-1724" }, { "db": "NVD", "id": "CVE-2012-1724" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP. \nThe vulnerability can be exploited over multiple protocols. This issue affects the \u0027JAXP\u0027 sub-component. \nThis vulnerability affects the following supported versions:\n7 Update 4, 6 Update 32. Further\ninformation about these flaws can be found on the Oracle Java SE Critical\nPatch page, listed in the References section. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2012-06-12-1 Java for OS X 2012-004 and Java for\nMac OS X 10.6 Update 9\n\nJava for OS X 2012-004 and Java for Mac OS X 10.6 Update 9 is now\navailable and addresses the following:\n\nJava\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7.4, OS X Lion Server v10.7.4\nImpact: Multiple vulnerabilities in Java\nDescription: Multiple vulnerabilities exist in Java, the most\nserious of which may allow an untrusted Java applet to execute\narbitrary code outside the Java sandbox. \nThese issues are addressed by updating to Java version 1.6.0_33. \nFurther information is available via the Java website at http://www.o\nracle.com/technetwork/java/javase/releasenotes-136954.html\nCVE-ID\nCVE-2012-0551\nCVE-2012-1711\nCVE-2012-1713\nCVE-2012-1716\nCVE-2012-1718\nCVE-2012-1719\nCVE-2012-1721\nCVE-2012-1722\nCVE-2012-1723\nCVE-2012-1724\nCVE-2012-1725\n\nJava\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: The Java browser plugin and Java Web Start are deactivated\nif they remain unused for 35 days\nDescription: As a security hardening measure, the Java browser\nplugin and Java Web Start are deactivated if they are unused for 35\ndays. Users may re-enable Java if they\nencounter Java applets on a web page or Java Web Start applications\nby clicking the region labeled \"Inactive plug-in\" on a web page. This\nsecurity measure is also available for OS Lion systems if the prior\nupdate \"Java for OS X 2012-003\" was not installed. \n\nJava\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7.4, OS X Lion Server v10.7.4\nImpact: The Java browser plugin and Java Web Start are deactivated\nif they do not meet the criteria for minimum safe version\nDescription: As a security hardening measure, the Java browser\nplugin and Java Web Start are deactivated if they do not meet the\ncriteria for minimum safe version. The minimum safe version of Java\nis updated daily, as needed. \n\nNote: These updates include the security content from Java for\nOS X 2012-003 and Java for Mac OS X 10.6 Update 8. \n\n\nJava for OS X 2012-004 and Java for Mac OS X 10.6 Update 9\nmay be obtained from the Software Update pane in System Preferences,\nor Apple\u0027s Software Downloads web site:\nhttp://www.apple.com/support/downloads/\n\nFor Mac OS X v10.6 systems\nThe download file is named: JavaForMacOSX10.6.dmg\nIts SHA-1 digest is: c2fcc844b7073d8243588f3407eb3ce1d497043d\n\nFor OS X Lion systems\nThe download file is named: JavaForOSX.dmg\nIts SHA-1 digest is: f176546327bc62d8cd397d54d1dc22b72aee1d2b\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.17 (Darwin)\nComment: GPGTools - http://gpgtools.org\n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\nlTEVodir4Ubn3QZQ0SK7\n=J235\n-----END PGP SIGNATURE-----\n. \n\nCVE-2012-1711 CVE-2012-1719\n \n Multiple errors in the CORBA implementation could lead to\n breakouts of the Java sandbox \n\nCVE-2012-1713\n\n Missing input sanitising in the font manager could lead to\n the execution of arbitrary code. \n \nCVE-2012-1716\n\n The SynthLookAndFeel Swing class could be abused to break\n out of the Java sandbox. \n\nCVE-2012-1723 CVE-2012-1725\n\n Validation errors in the bytecode verifier of the Hotspot VM\n could lead to breakouts of the Java sandbox. \n * S7143872, CVE-2012-1718: Improve certificate extension processing\n * S7143851, CVE-2012-1719: Improve IIOP stub and tie generation in RMIC\n * S7152811, CVE-2012-1723: Issues in client compiler\n * S7157609, CVE-2012-1724: Issues with loop\n * S7160757, CVE-2012-1725: Problem with hotspot/runtime_classfile\n * S7110720: Issue with vm config file loadingIssue with vm config\n file loading\n * S7145239: Finetune package definition restriction\n * S7160677: missing else in fix for 7152811\n \n The updated packages provides icedtea6-1.11.3 which is not vulnerable\n to these issues. The verification\n of md5 checksums and GPG signatures is performed automatically for you. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: java-1.7.0-openjdk security and bug fix update\nAdvisory ID: RHSA-2012:1009-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2012-1009.html\nIssue date: 2012-06-20\nCVE Names: CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 \n CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 \n CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 \n CVE-2012-1726 \n=====================================================================\n\n1. Summary:\n\nUpdated java-1.7.0-openjdk packages that fix several security issues and\none bug are now available for Red Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - noarch, x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, noarch, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, noarch, x86_64\n\n3. Description:\n\nThese packages provide the OpenJDK 7 Java Runtime Environment and the\nOpenJDK 7 Software Development Kit. \n\nMultiple flaws were discovered in the CORBA (Common Object Request Broker\nArchitecture) implementation in Java. A malicious Java application or\napplet could use these flaws to bypass Java sandbox restrictions or modify\nimmutable object data. (CVE-2012-1711, CVE-2012-1719)\n\nIt was discovered that the SynthLookAndFeel class from Swing did not\nproperly prevent access to certain UI elements from outside the current\napplication context. A malicious Java application or applet could use this\nflaw to crash the Java Virtual Machine, or bypass Java sandbox\nrestrictions. (CVE-2012-1716)\n\nMultiple flaws were discovered in the font manager\u0027s layout lookup\nimplementation. A specially-crafted font file could cause the Java Virtual\nMachine to crash or, possibly, execute arbitrary code with the privileges\nof the user running the virtual machine. (CVE-2012-1713)\n\nMultiple flaws were found in the way the Java HotSpot Virtual Machine\nverified the bytecode of the class file to be executed. A specially-crafted\nJava application or applet could use these flaws to crash the Java Virtual\nMachine, or bypass Java sandbox restrictions. (CVE-2012-1723,\nCVE-2012-1725)\n\nIt was discovered that java.lang.invoke.MethodHandles.Lookup did not\nproperly honor access modes. An untrusted Java application or applet could\nuse this flaw to bypass Java sandbox restrictions. (CVE-2012-1726)\n\nIt was discovered that the Java XML parser did not properly handle certain\nXML documents. An attacker able to make a Java application parse a\nspecially-crafted XML file could use this flaw to make the XML parser enter\nan infinite loop. (CVE-2012-1724)\n\nIt was discovered that the Java security classes did not properly handle\nCertificate Revocation Lists (CRL). CRL containing entries with duplicate\ncertificate serial numbers could have been ignored. (CVE-2012-1718)\n\nIt was discovered that various classes of the Java Runtime library could\ncreate temporary files with insecure permissions. A local attacker could\nuse this flaw to gain access to the content of such temporary files. \n(CVE-2012-1717)\n\nThis update also fixes the following bug:\n\n* Attempting to compile a SystemTap script using the jstack tapset could\nhave failed with an error similar to the following:\n\nerror: the frame size of 272 bytes is larger than 256 bytes\n\nThis update corrects the jstack tapset and resolves this issue. (BZ#833035)\n\nThis erratum also upgrades the OpenJDK package to IcedTea7 2.2.1. Refer to\nthe NEWS file, linked to in the References, for further information. \n\nAll users of java-1.7.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n829354 - CVE-2012-1711 OpenJDK: improper protection of CORBA data models (CORBA, 7079902)\n829358 - CVE-2012-1717 OpenJDK: insecure temporary file permissions (JRE, 7143606)\n829360 - CVE-2012-1716 OpenJDK: SynthLookAndFeel application context bypass (Swing, 7143614)\n829361 - CVE-2012-1713 OpenJDK: fontmanager layout lookup code memory corruption (2D, 7143617)\n829371 - CVE-2012-1719 OpenJDK: mutable repository identifiers in generated stub code (CORBA, 7143851)\n829372 - CVE-2012-1718 OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872)\n829373 - CVE-2012-1723 OpenJDK: insufficient field accessibility checks (HotSpot, 7152811)\n829374 - CVE-2012-1724 OpenJDK: XML parsing infinite loop (JAXP, 7157609)\n829376 - CVE-2012-1725 OpenJDK: insufficient invokespecial \u003cinit\u003e verification (HotSpot, 7160757)\n829377 - CVE-2012-1726 OpenJDK: java.lang.invoke.MethodHandles.Lookup does not honor access modes (Libraries, 7165628)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm\n\ni386:\njava-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm\n\nx86_64:\njava-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/java-1.7.0-openjdk-1.7.0.5-2.2.1.el6_3.src.rpm\n\ni386:\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.i686.rpm\njava-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.i686.rpm\n\nnoarch:\njava-1.7.0-openjdk-javadoc-1.7.0.5-2.2.1.el6_3.noarch.rpm\n\nx86_64:\njava-1.7.0-openjdk-debuginfo-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-demo-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-devel-1.7.0.5-2.2.1.el6_3.x86_64.rpm\njava-1.7.0-openjdk-src-1.7.0.5-2.2.1.el6_3.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2012-1711.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-1713.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-1716.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-1717.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-1718.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-1719.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-1723.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-1724.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-1725.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-1726.html\nhttps://access.redhat.com/security/updates/classification/#important\nhttp://icedtea.classpath.org/hg/release/icedtea7-2.2/file/icedtea-2.2.1/NEWS\nhttp://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2012 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFP4bdMXlSAg2UNWIIRAgLZAJ4rVT0qeWA3N7RGN/RRjkpcTqtF4wCeNbiZ\n7KUEsZqVLjXnfpCmLH3lpCM=\n=GGr3\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03441075\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03441075\nVersion: 3\n\nHPSBUX02805 SSRT100919 rev.3 - HP-UX Running Java, Remote Unauthorized\nAccess, Disclosure of Information, and Other Vulnerabilities\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2012-08-13\nLast Updated: 2012-08-28\n\n ----------------------------------------------------------------------------\n\nPotential Security Impact: Remote unauthorized access, disclosure of\ninformation, and other vulnerabilities\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential security vulnerabilities have been identified in Java Runtime\nEnvironment (JRE) and Java Developer Kit (JDK) running on HP-UX. \nHP-UX B.11.11, B.11.23, and B.11.31 running HP JDK and JRE v7.0.01, v6.0.14\nand v5.0.25 and earlier\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2012-0551 (AV:N/AC:M/Au:N/C:P/I:P/A:N) 5.8\nCVE-2012-1711 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2012-1713 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2012-1716 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2012-1717 (AV:L/AC:L/Au:N/C:P/I:N/A:N) 2.1\nCVE-2012-1718 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2012-1719 (AV:N/AC:L/Au:N/C:N/I:P/A:N) 5.0\nCVE-2012-1720 (AV:L/AC:H/Au:N/C:P/I:P/A:P) 3.7\nCVE-2012-1721 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2012-1722 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2012-1723 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2012-1724 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 5.0\nCVE-2012-1725 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2012-1726 (AV:N/AC:L/Au:N/C:P/I:P/A:N) 6.4\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nNOTE: The following apply to v7.0.01 and earlier: CVE-2012-0551,\nCVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718,\nCVE-2012-1719, CVE-2012-1720, CVE-2012-1721, CVE-2012-1722, CVE-2012-1723,\nCVE-2012-1724, CVE-2012-1725, CVE-2012-1726\n\nNOTE: The following apply to v6.0.14 and earlier: CVE-2012-0551,\nCVE-2012-1711, CVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718,\nCVE-2012-1719, CVE-2012-1720, CVE-2012-1721, CVE-2012-1722, CVE-2012-1723,\nCVE-2012-1724, CVE-2012-1725\n\nNOTE: The following apply to v5.0.25 and earlier: CVE-2012-1711,\nCVE-2012-1713, CVE-2012-1716, CVE-2012-1717, CVE-2012-1718, CVE-2012-1719,\nCVE-2012-1720, CVE-2012-1723, CVE-2012-1725\n\nRESOLUTION\n\nHP has provided the following Java version upgrade to resolve these\nvulnerabilities. \nThe upgrade is available from the following location\n\nhttp://www.hp.com/go/java\n\nHP-UX B.11.23, B.11.31\n JDK and JRE v7.0.02 or subsequent\n\nHP-UX B.11.11, B.11.23, B.11.31\n JDK and JRE v6.0.15 or subsequent\n\nHP-UX B.11.11, B.11.23, B.11.31\n JDK and JRE v5.0.26 or subsequent\n\nMANUAL ACTIONS: Yes - Update\nFor Java v7.0 update to Java v7.0.02 or subsequent\nFor Java v6.0 update to Java v6.0.15 or subsequent\nFor Java v5.0 update to Java v5.0.26 or subsequent\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application\nthat replaces HP-UX Security Patch Check. It analyzes all Security Bulletins\nissued by HP and lists recommended actions that may apply to a specific HP-UX\nsystem. It can also download patches and create a depot automatically. For\nmore information see https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS\n\nHP-UX B.11.23\nHP-UX B.11.31\n===========\nJdk70.JDK70-COM\nJdk70.JDK70-DEMO\nJdk70.JDK70-IPF32\nJdk70.JDK70-IPF64\nJre70.JRE70-COM\nJre70.JRE70-IPF32\nJre70.JRE70-IPF32-HS\nJre70.JRE70-IPF64\nJre70.JRE70-IPF64-HS\naction: install revision 1.7.0.02.00 or subsequent\n\nHP-UX B.11.23\nHP-UX B.11.31\n===========\nJdk60.JDK60-COM\nJdk60.JDK60-DEMO\nJdk60.JDK60-IPF32\nJdk60.JDK60-IPF64\nJre60.JRE60-COM\nJre60.JRE60-IPF32\nJre60.JRE60-IPF32-HS\nJre60.JRE60-IPF64\nJre60.JRE60-IPF64-HS\naction: install revision 1.6.0.15.00 or subsequent\n\nHP-UX B.11.23\nHP-UX B.11.31\n===========\nJdk15.JDK15-COM\nJdk15.JDK15-DEMO\nJdk15.JDK15-IPF32\nJdk15.JDK15-IPF64\nJre15.JRE15-COM\nJre15.JRE15-COM-DOC\nJre15.JRE15-IPF32\nJre15.JRE15-IPF32-HS\nJre15.JRE15-IPF64\nJre15.JRE15-IPF64-HS\naction: install revision 1.5.0.26.00 or subsequent\n\nHP-UX B.11.11\nHP-UX B.11.23\n===========\nJdk60.JDK60-COM\nJdk60.JDK60-DEMO\nJdk60.JDK60-PA20\nJdk60.JDK60-PA20W\nJre60.JRE60-COM\nJre60.JRE60-COM-DOC\nJre60.JRE60-PA20\nJre60.JRE60-PA20-HS\nJre60.JRE60-PA20W\nJre60.JRE60-PA20W-HS\naction: install revision 1.6.0.15.00 or subsequent\n\nHP-UX B.11.11\nHP-UX B.11.23\n===========\nJdk15.JDK15-COM\nJdk15.JDK15-DEMO\nJdk15.JDK15-PA20\nJdk15.JDK15-PA20W\nJre15.JRE15-COM\nJre15.JRE15-COM-DOC\nJre15.JRE15-PA20\nJre15.JRE15-PA20-HS\nJre15.JRE15-PA20W\nJre15.JRE15-PA20W-HS\naction: install revision 1.5.0.26.00 or subsequent\n\nEND AFFECTED VERSIONS\n\nHISTORY\nVersion:1 (rev.1) - 13 August 2012 Initial release\nVersion:2 (rev.2) - 27 August 2012 Added v5.0.26 information\nVersion:3 (rev.3) - 28 August 2012 Corrected CVE applicability\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated\nperiodically, is contained in HP Security Notice HPSN-2011-001:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttp://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nuCosminexus Products Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA49578\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49578/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49578\n\nRELEASE DATE:\n2012-06-15\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49578/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49578/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49578\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nHitachi has acknowledged multiple vulnerabilities in uCosminexus\nproducts, which can be exploited by malicious, local users to\ndisclose potentially sensitive information, manipulate certain data,\nand cause a DoS (Denial of Service) and by malicious people to\nconduct cross-site scripting attacks, disclose potentially sensitive\ninformation, manipulate certain data, cause a DoS (Denial of\nService), and compromise a vulnerable system. \n\nThe vulnerabilities are caused due to vulnerabilities in the bundled\nversion of Cosminexus Developer\u0027s Kit for Java. \n\nFor more information:\nSA49472\n\nPlease see the vendor\u0027s advisory for a list of affected products. \n\nORIGINAL ADVISORY:\nHS12-015:\nhttp://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-015/index.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. Content-Disposition: inline\n\n==========================================================================Ubuntu Security Notice USN-1505-2\nAugust 30, 2012\n\nicedtea-web regression\n==========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 11.10\n- Ubuntu 11.04\n\nSummary:\n\nUSN 1505-1 introduced a regression in the IcedTea-Web Java web browser\nplugin that prevented it from working with the Chromium web browser. \n\nSoftware Description:\n- icedtea-web: A web browser plugin to execute Java applets\n\nDetails:\n\nUSN-1505-1 fixed vulnerabilities in OpenJDK 6. As part of the update,\nIcedTea-Web packages were upgraded to a new version. That upgrade\nintroduced a regression which prevented the IcedTea-Web plugin from\nworking with the Chromium web browser in Ubuntu 11.04 and Ubuntu 11.10. \n\nWe apologize for the inconvenience. (CVE-2012-1724)\n\n As part of this update, the IcedTea web browser applet plugin was\n updated for Ubuntu 10.04 LTS, Ubuntu 11.04, and Ubuntu 11.10. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 11.10:\n icedtea-6-plugin 1.2-2ubuntu0.11.10.3\n\nUbuntu 11.04:\n icedtea-6-plugin 1.2-2ubuntu0.11.04.3\n\nAfter a standard system update you need to restart your web browser\nto make all the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2012-1724" }, { "db": "BID", "id": "53958" }, { "db": "VULMON", "id": "CVE-2012-1724" }, { "db": "PACKETSTORM", "id": "113609" }, { "db": "PACKETSTORM", "id": "113613" }, { "db": "PACKETSTORM", "id": "114469" }, { "db": "PACKETSTORM", "id": "113853" }, { "db": "PACKETSTORM", "id": "113945" }, { "db": "PACKETSTORM", "id": "115980" }, { "db": "PACKETSTORM", "id": "113723" }, { "db": "PACKETSTORM", "id": "116028" }, { "db": "PACKETSTORM", "id": "114669" }, { "db": "PACKETSTORM", "id": "113605" }, { "db": "PACKETSTORM", "id": "113943" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1724", "trust": 2.4 }, { "db": "BID", "id": "53958", "trust": 1.4 }, { "db": "HITACHI", "id": "HS12-015", "trust": 0.4 }, { "db": "ICS CERT", "id": "ICSA-17-213-02", "trust": 0.3 }, { "db": "HITACHI", "id": "HS12-016", "trust": 0.3 }, { "db": "SECUNIA", "id": "49578", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2012-1724", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113609", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113613", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "114469", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113853", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113945", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "115980", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113723", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116028", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "114669", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113605", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "113943", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2012-1724" }, { "db": "BID", "id": "53958" }, { "db": "PACKETSTORM", "id": "113609" }, { "db": "PACKETSTORM", "id": "113613" }, { "db": "PACKETSTORM", "id": "114469" }, { "db": "PACKETSTORM", "id": "113853" }, { "db": "PACKETSTORM", "id": "113945" }, { "db": "PACKETSTORM", "id": "115980" }, { "db": "PACKETSTORM", "id": "113723" }, { "db": "PACKETSTORM", "id": "116028" }, { "db": "PACKETSTORM", "id": "114669" }, { "db": "PACKETSTORM", "id": "113605" }, { "db": "PACKETSTORM", "id": "113943" }, { "db": "NVD", "id": "CVE-2012-1724" } ] }, "id": "VAR-201206-0060", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 1.0 }, "last_update_date": "2024-07-22T22:31:05.374000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Red Hat: Important: java-1.6.0-openjdk security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120730 - security advisory" }, { "title": "Red Hat: Critical: java-1.6.0-openjdk security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120729 - security advisory" }, { "title": "Red Hat: Important: java-1.7.0-openjdk security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20121009 - security advisory" }, { "title": "Red Hat: Critical: java-1.6.0-sun security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120734 - security advisory" }, { "title": "Red Hat: Critical: java-1.7.0-oracle security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20121019 - security advisory" }, { "title": "Ubuntu Security Notice: icedtea-web regression", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1505-2" }, { "title": "Ubuntu Security Notice: icedtea-web, openjdk-6 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1505-1" }, { "title": "Debian CVElist Bug Report Logs: Multiple security issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=7cdfa8352322325a72cf46ff8e206909" }, { "title": "Debian Security Advisories: DSA-2507-1 openjdk-6 -- several vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=d2e928cec2eba459dd773bba1bb061d9" }, { "title": "Amazon Linux AMI: ALAS-2012-088", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2012-088" } ], "sources": [ { "db": "VULMON", "id": "CVE-2012-1724" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1724" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html" }, { "trust": 1.2, "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-june/019076.html" }, { "trust": 1.2, "url": "http://rhn.redhat.com/errata/rhsa-2012-0734.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=134496371727681\u0026w=2" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/53958" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:095" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2013:150" }, { "trust": 1.1, "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a16659" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1718" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1713" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1716" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1724" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1711" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1717" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1725" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1723" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1719" }, { "trust": 0.4, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs12-015/index.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2012-1725.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2012-1718.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2012-1717.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2012-1711.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2012-1723.html" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.4, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2012-1719.html" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1721" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1722" }, { "trust": 0.4, "url": "https://access.redhat.com/knowledge/articles/11258" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2012-1724.html" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2012-1716.html" }, { "trust": 0.4, "url": "https://www.redhat.com/security/data/cve/cve-2012-1713.html" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0551" }, { "trust": 0.4, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.3, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03441075\u0026ac.admitted=1344943226168.876444892.199480143" }, { "trust": 0.3, "url": "http://java.sun.com" }, { "trust": 0.3, "url": "http://support.attachmate.com/techdocs/2560.html" }, { "trust": 0.3, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-213-02" }, { "trust": 0.3, "url": "https://downloads.avaya.com/css/p8/documents/100163510" }, { "trust": 0.3, "url": "http://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?docid=emr_na-c03909126-1\u0026ac.admitted=1378134276525.876444892.492883150" }, { "trust": 0.3, "url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docdisplay?docid=emr_na-c04126444" }, { "trust": 0.3, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs12-016/index.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21616184" }, { "trust": 0.3, "url": "http://www.vmware.com/security/advisories/vmsa-2012-0013.html" }, { "trust": 0.3, "url": "http://www.xerox.com/download/security/security-bulletin/16aeb-4cd3628b94080/cert_xrx12-009_v1.1.pdf" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1726" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-1722.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-0551.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-1721.html" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-1726.html" }, { "trust": 0.2, "url": "http://www.ubuntu.com/usn/usn-1505-1" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=26160" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/1505-2/" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "http://www.o" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1711" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1719" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1716" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1723" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1725" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1717" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1724" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1713" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1718" }, { "trust": 0.1, "url": "http://icedtea.classpath.org/hg/release/icedtea7-2.2/file/icedtea-2.2.1/news" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2012-1009.html" }, { "trust": 0.1, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.1, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.1, "url": "http://www.hp.com/go/java" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1720" }, { "trust": 0.1, "url": "https://www.hp.com/go/swa" }, { "trust": 0.1, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49578/" }, { "trust": 0.1, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.1, "url": "http://secunia.com/advisories/49578/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49578" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/icedtea-web/1.2-2ubuntu0.11.04.3" }, { "trust": 0.1, "url": "http://www.ubuntu.com/usn/usn-1505-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/icedtea-web/1.2-2ubuntu0.11.10.3" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1025553" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openjdk-6/6b24-1.11.3-1ubuntu0.11.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/icedtea-web/1.2-2ubuntu0.11.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openjdk-6/6b24-1.11.3-1ubuntu0.11.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/icedtea-web/1.2-2ubuntu0.10.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openjdk-6/6b24-1.11.3-1ubuntu0.12.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/openjdk-6/6b24-1.11.3-1ubuntu0.10.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/icedtea-web/1.2-2ubuntu0.11.04.1" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2012-0730.html" }, { "trust": 0.1, "url": "http://icedtea.classpath.org/hg/release/icedtea6-1.10/file/icedtea6-1.10.8/news" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2012-1019.html" } ], "sources": [ { "db": "VULMON", "id": "CVE-2012-1724" }, { "db": "BID", "id": "53958" }, { "db": "PACKETSTORM", "id": "113609" }, { "db": "PACKETSTORM", "id": "113613" }, { "db": "PACKETSTORM", "id": "114469" }, { "db": "PACKETSTORM", "id": "113853" }, { "db": "PACKETSTORM", "id": "113945" }, { "db": "PACKETSTORM", "id": "115980" }, { "db": "PACKETSTORM", "id": "113723" }, { "db": "PACKETSTORM", "id": "116028" }, { "db": "PACKETSTORM", "id": "114669" }, { "db": "PACKETSTORM", "id": "113605" }, { "db": "PACKETSTORM", "id": "113943" }, { "db": "NVD", "id": "CVE-2012-1724" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2012-1724" }, { "db": "BID", "id": "53958" }, { "db": "PACKETSTORM", "id": "113609" }, { "db": "PACKETSTORM", "id": "113613" }, { "db": "PACKETSTORM", "id": "114469" }, { "db": "PACKETSTORM", "id": "113853" }, { "db": "PACKETSTORM", "id": "113945" }, { "db": "PACKETSTORM", "id": "115980" }, { "db": "PACKETSTORM", "id": "113723" }, { "db": "PACKETSTORM", "id": "116028" }, { "db": "PACKETSTORM", "id": "114669" }, { "db": "PACKETSTORM", "id": "113605" }, { "db": "PACKETSTORM", "id": "113943" }, { "db": "NVD", "id": "CVE-2012-1724" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-06-16T00:00:00", "db": "VULMON", "id": "CVE-2012-1724" }, { "date": "2012-06-12T00:00:00", "db": "BID", "id": "53958" }, { "date": "2012-06-13T22:56:24", "db": "PACKETSTORM", "id": "113609" }, { "date": "2012-06-13T23:29:16", "db": "PACKETSTORM", "id": "113613" }, { "date": "2012-07-05T18:33:01", "db": "PACKETSTORM", "id": "114469" }, { "date": "2012-06-19T01:15:18", "db": "PACKETSTORM", "id": "113853" }, { "date": "2012-06-20T14:26:44", "db": "PACKETSTORM", "id": "113945" }, { "date": "2012-08-29T04:01:09", "db": "PACKETSTORM", "id": "115980" }, { "date": "2012-06-15T04:27:32", "db": "PACKETSTORM", "id": "113723" }, { "date": "2012-08-30T00:37:34", "db": "PACKETSTORM", "id": "116028" }, { "date": "2012-07-13T02:22:30", "db": "PACKETSTORM", "id": "114669" }, { "date": "2012-06-13T22:55:37", "db": "PACKETSTORM", "id": "113605" }, { "date": "2012-06-20T14:25:38", "db": "PACKETSTORM", "id": "113943" }, { "date": "2012-06-16T21:55:03.547000", "db": "NVD", "id": "CVE-2012-1724" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-18T00:00:00", "db": "VULMON", "id": "CVE-2012-1724" }, { "date": "2017-08-03T11:09:00", "db": "BID", "id": "53958" }, { "date": "2022-05-13T14:52:55.103000", "db": "NVD", "id": "CVE-2012-1724" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "53958" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Oracle Java SE CVE-2012-1724 Remote Java Runtime Environment Vulnerability", "sources": [ { "db": "BID", "id": "53958" } ], "trust": 0.3 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "53958" } ], "trust": 0.3 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.